For The Serious User Of Personal Com uters

• RDEX SolJ~eY3 = Adventures of Sinbad • ARCHIVEmath • Aztec • Broadsides v2.0 • Calculus Toolkit • Cannonball Blitz • Catalyst 3.0 • Cofa Courseware. Cross Clues. Deathsword • Defender of the Crown. Dondra • Gauntlet. G.I. Joe • King'. Quest I • King's Quest U • King's Quest ill • Magical Myths • Math Shop. Mathhlaster • Mathhusters • Mavi8 Beacon Teach.. Typing • Megabots • Micro Addition/Subtraction • Microzine 625 • Microzine #26 .One-on-One • PFS Computer Checkup • PFS File • PFS Graph • PFS Report • PiratesI • Piratesl Ugs • Pr..enter • Rescue on Fracta1us • Science Toolkit • Smart Eyes. Softswiteh • Spiderbot • Tales from the Arabian Nights.Thinkware • Tink's Subtraction Fair • Tower of Myraglen • Ultima V • Xevious

ImI R.I>E~: Softkey: .Print Shop .Test Drive

BULK RATE COMPUTIST U.S. Postage PO Box 110846·T PAID Tacoma, WA 98411 Tacoma, WA Permit No. 269 You have a COMPUTIST

Editor: Charles R. Haight LEGAL RIGHT Circulation: Karen Fitzpatrick Advertising, call: (206) 474-5750 to an unlocked Publisher: SoftKey Publishing backup copy Printing: Valco Graphics & Printing • Address all advertising inquiries to: COMPUTIST; Advertising Department; PO of your Box 110816; Tacoma, WA 98411 • Mail all RDEX letters to: cOllllllercial COMPUTIST Apple·RDEX or IBM-RDEX PO Box I 10846-K software Tacoma. WA 98411 • COMPUTIST does NOT purchase editorial material. The entire editorial content consists Our editorial policy is that we do NOT condone of information submitted to COMPUTIST for software piracy, but we do believe that users are entitled publication in the shared interests of all COMPUTISTs. to backup commercial disks they have purchased. • Unsolicited material (manuscripts. letters In addition to the security ofa backup disk, the removal to the editor. softkeys. A.P.T.s, playing tips. of copy-protection gives the user the option of modifying questions. etc.) are assumed to be submitted as letters-to-the-RDEX-editor for publication programs to meet his or her needs_ with all and exclusive rights belonging to Furthermore, the copyright laws guarantee your right COMPUTIST. to such a DEPROTECTED backup copy: • Entire contents copyright 1988 by SoftKey Publishing. All rights reserved. Copying done for other than personal or intemal reference (without express written permission from the ...lilt is not an infringement for the owner of a copy of publisher) is prohibited. a computer program to make or authorize the making of • The volunteer and paid editorial staff another copy or adaptation of that computer program assume no liability or responsibility for the products advertised in the magazine. Any provided: opinions expressed by the authors are not 1) that such a new copy or adaptation is created as an necessarily those of COMPUTIST magazine. its staff or SoftKey Publishing. essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other • Apple® is a trademark of Apple manner, or Computers. IBM® is the IBM trademark. SUBSCRIPTIONS: Rates (for 11 issues): 2) that such new copy or adaptation is for archival U.S.-S31 U.S. 1st Class-$45 purposes only and that all archival copies are destroyed in Canada/Mex. - $4 5 Other Foreign-$75 the event that continued possession of the computer program • Send subscription inquiries to: should cease to be rightful. COMPUTIST; Subscription Department; PO Any exact copies prepared in accordance with the Box 110846·T; Tacoma. WA 98411 provisions of this section may be leased, sold, or otherwise • For Domestic Dealer rates: Call (106) transferred, along with the copy from which such copies 474·5750 for more information. were prepared, only as part of the lease, sale, or other • Change Of Address: Please allow 4 transfer of all rights in the program. Adaptations so prepared weeks for change of address to take effect. On postal form 3576 supply your new may be transferred only with the authorization of the address and your most recent address label. copyright owner." • Issues missed due to non-receipt of change of address may be acquired at the regular United States Code title 17, §117 back issue rate.

I 2 COMPUTIST #61 Novembel' I Attention Apple-users: Why type those I-o-n-g listings when you can just Upgrade your present sub. to a MagI5~"Disk Combo subscription • • You may upgrade your current subscription to a magazine & disk combination by sending $5.50 ($6.50 foreign) per remaining issue. • Time to renew? • Check your mailing label to see if you need to renew your subscription. o Use the order form on this page to renew, and don't forget to send your most current mailing label to help expedite your renewal • Moving soon? • If you're moving, let us know at least 30 days in advance. • Issues missed due to non-reciept of Change-of-Address may be acquired at the regular back issue rates. • Remember, the Post Office does not forward third class mail unless requested. COMPUTIST is not responsible for replacing issues lost while forwarding order is in effect. • r------, • Yes, I want to subscribe to COMPUTIST. Enclosed are funds for an annual (12 issue) subscription.

I am... 0 A new subscriber o Renewing my current subscription Name ID# _ o Changing my address (please include last mail label) I have..D an Apple lie. IIgs or lie computer Address o an IBM computer City State Zip Apple-IBM subscription... o U.S.' $32 Country ~ Phone, _ o U.S.lCanada/Mexico First Class· $45 o All other Foreign . $75 Exp. Apple mag-disk combination subscription... •• o U.S.lCanada/Mexico First Class plus Library Disk . $100 Signature CP61 o All other Foreign plus Library Disk . $ 140 U.S. Funds drawn on U.S. bank. Allow 4-8 weeks for first issue. Mail to: COMPUTIST PO Box 110846·T Tacoma. WA 98411 (206) 474·5750 ~------~ I November COMPUTIST #61 3 I - -- -~----~ ------~-- ~ -- Notes 'n things . 0000000000000 • Send your letters on disk Jim Bancroft...... I5 I've been getting more and more of your letters, on disk and it's great. I love it. A lot less editing and a lot less errors. Ofcourse, ifyou're one ofthe people who sent your letter as hardcopy Ted E. Bare ...... 24 (on paper), you are probably not to thrilled with my response time. (I'm about 2 months behind in my written correspondence.) I'm making a special effort and I'll have most ofyour letters typed Captain Dan ...... 36 and in the next COMPUTIST. (I hope.) I do want to say again and reemphasize, ifyour letter is more than halfofa page, please send it on disk. I'm very good about returning disks. But I'm Dan Halfwit ...... 7 a rotten typist (die-hard two finger and a thumb type). I wish we had a real typist but they normally don't work for free. In fact, I wish we had a few hundred more subscribers so I could also add Jim S. Hart ...... 33 another 16 pages for all the new stuff that has been coming in on disk. MJ Howard ...... , .. 21 • Questions Jeff Hurlburt ...... 28 The following are some questions that got a chuckle out ofKaren. She's the person who answers the phone, processes and packs your orders, as well as entering new subscriptions and renewals Bill Jetzer ...... 20,25 into the computer. Be nice to her, she works a full day and only gets minimum wage. Ifshe doesn't process your order, we would have too. (You wouldn't want someone who types with two fingers Blain Johnson ...... 30 to enter and pack your order, would you?) Donald Jones ...... 33 From a non-subscriber who ordered a back issue from an ad flyer: Q. Along with my order, do I get the ($32 value) free subscription? Robert Kettle ...... 30 A. Nice try. The subscription is $32. The FREE software package ($32 value) comes with it. Gotta buy one to get the other. Craig Meekins ...... 23 From a subscriber who was renewing: Q. Please send a list of currently available products (Disks & Books). Jack Nissel ...... 21 A. We send you a new updated list every month. All our products are listed in the back of each issue, however, we have access to a number of wholesalers. Ifthere is something you're looking Nemoran Pierre...... 26 for, write and ask, we'll tell you the best price we can find. From a new Foreign subscriber: Authur Simon...... I8 Q. I would like to ask you, How come the back issues are more expensive then the subscription? A. Because we want you to subscribe... Sorry, just kidding. Regular subscriptions are handled Silicon Sorcerer...... I8 automatically once a month by a mail fowarding service. All of the foreign orders are picked up here and flown to New York where they are sorted and flown to their respective countries. There Charles Taylor...... 19 they are put into the regular mail system. Back issue orders must be handled on an individual basis and sent by regular mail service (1st Class Air). That means they cost more to send and Edward Teach...... I2 take more time to process.

Dr. Jean·louis Torre 30 • Starter Kit Woes! Brian A. Troha...... 8 If your printer just spews paper when you try to print the DOC files, try this tip; when the Gary Verbuch 22.26 program asks for the right margin (80), it really wants to know the right indent (normally 0). Tell it zero and things should work fine. Just a syntax problem with the man who wrote the print J.l. Walters 23 routine. Mike say's he'll have it fixed in a jiffy. John E. Wanner 17 • Missed Issues? Issues are mailed at the end ofeach month and can take up to 4 weeks to get to you. (Depends IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM on where you are and what the US snail is doing about then.) Give the issue enough time to get to you. But, if you feel that too much time has gone by without a COMPUTIST appearing in your mail, write to Karen (or call). Don't wait for 6 months before you say anything. Karen can be very unsympathetic to your tale of woe and will only replace the last issue or two. Mike Basford 44

C.J. Blanchard ..... ~ ... 44

Kevin Dobbins 44 BUGS= COMPUTIST #58, page 32. Computing for 1-3 year olds - In listing I, there is an extra open Neal Jhala 44 parenthesis in line 220. It should read: 220 NN =INT ( RND (l) * Fe + 1)

I 4 COMPUTIST #61 November I COMPUTIST #61 Table Of Contents November 1988 Editorial...... 4 Adventures of Sinbad 12 ARCHIVEmath 35 Bugs .••.•.•.••••...•.•..•••..•••.•••••••••.•••••• 4 Aztec 23 Broadsides v2. O 23 Apple Most Wanted SoftkeysII •• II II II II • II IIII • II37 Calculus Toolkit 33 IBM Most Wanted Softkeys 45 Cannonball Blitz 21 Catalyst 3. O...... •...... •...... 20 Cofa Courseware 19 .F~: Cross Clues 15 Deathsword 19 Defender of the Crown 11 Dondra 36 Gauntlet 19 Double DOS 12 G.I. Joe 21 An easier way to copy disks with multiple address and data mark changes. King's Quest / 11 King's Quest 11. 11 Deprotection tips for DOS and ProDOS 22 King's Quest Ill .36 Important locations and places to poke. Magical Myths l0 Math Shop 35 Mathbklster 15 A Search Command for II's ..... II .. II. II II II II ..26 Mathbusters 20 Copy the new search command from the enhanced lie and put it into your older II. Mavis Beacon Teaches Typing 9 Megabots 16 Zip Chip finally Ships 26 Micro Addition/Subtraction 34 A reader review of a long awaited product. Microzine #25 23 Microzine #26 24 One-on-One 24 The Product l4onitor 2f1 PFS Computer Checkup 16 Jeff Hurlburt takes a look at super·res graphics on the IIgs and Chess on the MAC. PFS File 22 PFS Graph 22 Put a deprotected... PFS Report 22 Pirates! 7 1 Pirates! Ilgs 8 Where in Europe is Carmen Sandiego on a312" disk .....33 Presenter 20 Get rid of that 514" disk and forget about flipping disks. Rescue on Fractalus 18 Science Toolkit 25 A self-booting Thexder 34

Smart Eyes :: 16 Put ProDOS and Thexder on a 3V2 H disk. Softswitch , 9 Spiderbot 34 Tales from the Arabian Nights 11 Capture protected RWTS with... Thinkware 16 Tink's Subtraction Fair 21 RWTS Worm 35 Tower of Myraglen 21 Here's a neat way to extract the RWTS from a protected disk. Ultima V 37 Xevious 7 Some notes on Mindscape , 16 .A.'P.T.6: Some notes on Scholastic .. ,,,, Bard's Tale IlL 32.33 16 Ultima V ' 30.31 • 'PftuJbcg Tip6: Some notes on Hartley Software , .. , 16 Ultima V 30 Some notes on Prentice Hall 16 Wasteland 17 IBM S"~6: Some notes on CAl , , 16 Print Shop 45 Test Drive 44 Some notes on CTW Series 17 IBM 'PftuJlHg Tip6: Some notes on Garfield in the lAnd ofthe lounge Lizards . .44 17

November COMPUTIST #61 5 I •

New COMPUTIST readers using Apple lIs Relet into the Monitor must be typed appear in COMPUTIST as delta are advised to readthis page carefully to avoid characters (b.). All other spaces are there for Softkeys occasionally require the user to stop frustration when attempting to follow a softkey easier reading. NOTE: If you want your the execution ofa copy-protected program and or entering the programs printed in this issue. checksums (See Computing checksums) to directly enter the Apple's system monitor. match up, only type spaces within quotes or What is a softkey, anyway? Check the following list to see what hardware after DATA statements if they are shown as you will need to obtain this ability. Softkey is a tenn which we coined to describe delta (b.) charactors. a procedure that removes, or at least Apple n +, lie, compatibles: 1) Place an Keying In Hud1llDpt circumvents, any copy-protection on a Integer BASIC ROM card in one ofthe Apple particular disk. Once a softkey procedure has slots. 2) Use a non-maskable interrupt (NMI) Machine language programs are printed in been perfonned, the resulting backup copy can card such as Replay or Wildcard. COMPUTIST as hexdumps, sometimes also as source code. Hexdumps are the shortest and usually be copied by the normal copy programs Apple II +, compatibles: 1) Install an F8 easiest format to type in. You must first enter (for example: COpyA, on the DOS 3.3 System ROM with a modified reset-vector on the the monitor: Master disk). computer's motherboard as detailed in the "Modified ROM's" article (COMPUTIST #6 CALL -151 Commuu aDd control keys or Book Of Softkeys III) or the "Dual Key in the hexdump exactly as it appears in Commands which a reader is required to ROM's" article (COMPUTIST #19). the magazine, ignoring the four-digit checksum perfonn are set apart by being in boldface and Apple lIe. lIe: Install a modified CD ROM ($ and four digits) at the end ofeach line. When on a separate line. The IRETURlII key must be on the computer's motherboard. Cutting Edge finished, return to BASIC with: pressed at the end of every such command Ent. (Box 43234 Ren Cen Station-HC; Detroit, 3DCIG unless otherwise specified. Control characters MI 48243) sells a hardware device that will give are specially boxed. An example of both is: BSAVE the program with the filename, you this important ability but it will void an address and length parameters given in the 61B,I Apple //c warranty. article. Press [!]. Next, place one finger on the EJ Apple IIgs: Ifyou have the 2.x ROM, there The source code is printed to help explain a key and then press [i]. Don't forget to press is a hidden classic desk accessory (CDA) that program's operation. To enter it, you need an IRITUllNI. allows you to enter the monitor. In order to "Assembler". Most of the source code is in Other special combination keypresses include install the new CDA, you should enter the S-C Assembler format. If you use a different I8RESETI or 108R1SETI. In the fonner, monitor before running any protected 3rograms assembler, you will have to translate pieces of press and hold down (~) then press IRESET I. (CALL -151) and press "N IRITUllN ". This the source code into something your assembler In the latter, press and hold down both EJ will tum on two hidden CDAs, Memory Peeker will understand. and ~ then press IRESETI. and Visit Monitor. Thereafter press (OB ESC I Computing checksums to go to the Desk Accessories menu. Select Software recommendations "Visit Monitor" and there you are. Use IBY 1 Checksums are 4-digit hexadecimal numbers which tell if you typed a program correctly. The Starter Kit contains most ofthe programs to exit. There are two types ofchecksums: one created that you need to "Get started". In addition, we Recommended titerature: by the CHECKBIN program (for machine recommend that you aquire the following: • Apple II Reference Manual language programs) and the other created by • Applesoft program editor such as "Global • DOS 3.3 manual the CHECKSOFT program (for BASIC Program Line Editor (GPLE)". • Beneath Apple DOS & Beneath Apple programs). Both are on the "Starter Kit". • Assembler such as the "S-C Assembler" ProDOS, by Don Worth and Pieter Ifyour checksums do not match the published from S-C software or "Merlin/Big Mac". Lechner, from Quality Software checksums then the line where the first checksum differs is incorrect. • Bit-copy program such as "Copy II Plus", Keying in Applesoft programs: CHECKSOFT instructions: Install Checksoft "Locksmith" or "Essential Data Duplicator BASIC programs are printed in a fonnat that (BRUN CHECKSOFT) then LOAD your (EDD)". is designed to minimize errors for readers who program. Press W to get the checksums. • Text-editor (that produces normal sequential key in these programs. If you type: Correct the program line where the checksums text files) such as "Applewriter II", "Magic 18aOIlE:llIIICLEAIl SCREEN differ. Window II" or "Screenwriter II". CHECKBIN instructions: Enter the monitor The LIST will look like: (CALL -151), install Checkbin at some out of • "COPYA", "AD" and "MUFFIN" from the way place (BRUN CHECKBIN, A$60(l)0), the DOS 3.3 System Master disk are also 10 HOME : REM CLEAR SCREEN useful. and then LOAD your program. Get the ." because Applesoft inserts spaces into a checksums by typing the Starting address, a Super 108 and Controllen program listing before and after every command period and the Ending address of the file word or mathematical operator. These spaces followed by a IGY I. This powerful deprotection utility (in the don't pose a problem except when they are COMPUTIST Starter Kit) and its various inside of quotes or after a DATA command. SSSS.EEEI IGY I Controllers are used in many softkeys. (It is also There are two types ofspaces: those that have Correct the lines at which the checksums on each Super lOB Collection disk.) to be keyed and those that don't. Spaces that differ. . RDEXed

I 8 COMPUTIST #81 November I ------

Previously, the bulk ofMicroProse games were in normal format and the catalog track was Dan Hal/wit when moved. Sometimes not even that. You would i only get so far, to then find that another writing a Softkey for... protection scheme found you. With Pirates!, ~:.;.;.;,,;,,;;,..:.-_------you don't even start on square one. Some format that I am not at all familiar with popped up. Fortunately, I found a small hole in it, and RVex ediioJt Mindscape that was all I needed. First, format one of your ProDOS disks • Requirements RDD stands for: with the volume name of IPIRATES.SIDEI. o COPYA (Don't type the period after the number I.) Reader's Data EXchange o Copy II Plus or FID Then copy BASIC.SYSTEM to that disk, and rename it to PIRATES.SYSTEM. Starting to That means that when you send in This was too easy. get the point? Now, the fun part. articles, softkeys, APTs, etc., you are IT] Use COPYA and the following pokes For IIgs users, enter the monitor submitting them for FREE publication in (CALL-151) and type a # sign at the monitor to disable the checksum verify: this magazine. RDEX does NOT prompt. This will give you the CDA's (Classic purchase submissions nor do we verify POlE 47485,24 Desktop Aces.). Put Pirates! in drive I and type data submitted by readers. We priht POKE 47486,96 C600G at the prompt to boot the disk. Listen what you write. If you discover any POKE 47497,24 to the drive. After the arm of the disk clicks errors, please let us know. POlE 47498,96 ONCE, Press lOG ESC lor the NMI button if RUN COPYA • Remember that your letters or parts you have it. Select "Visit Monitor" from the Control of them may be used in RDEX even if Use Copy II Plus to copy a normal cr:J Panel (IIgs users.) At the monitor prompt, type not addressed to the RDEX editor. DOS over the first 3 tracks of the copy and AM: EA EA EA to kill the" ACCESS ERROR #1 " Correspondence that gets published may change the boot file to HELLO. be edited for clarity, grammar and space message (didn't that feel good, and on an requirements . Optional: original disk too!) and 9E7: 4C 69 FF to replace cr:J Initialize a disk. the command to start ProDOS with a monitor • Because ofthe great number ofletters bomb. Now, press IGyl and IRETURNI to we receive and the ephemeral and INIT BELLO return to the control panel. Select QUIT. unpredictable appearance of our part­ DELETE HELLO Pirates! will go a little more and give you a time staff, any response to your queries Insert the disk with FID and monitor prompt. You now have their funny will appear only in RDEX, so it would DOS in memory to do your bidding! be more appropriate for you to present BRUNno Remove Pirates! and replace it with the technical questions to the readers and ask Copy all files from the COPYA copy of ProDOS disk you made earlier with the for their responses which will then be XEVIOUS to the initialized disk using the renamed BASIC.SYSTEM. Type 20000 at placed in the Apple-RDEX. wildcard (=) character. the monitor prompt, and in a few seconds, you • Whenever possible, send your articles are in BASIC. You now have a DOS in memory and letters on disk as standard text files. Softkey for... that reads normal and abnormal (Pirates!) DOS. When we get your letter-article in a text Use the "-" wildcard command to start Copy file, it is immediately uploaded into the Pirates! II Plus (PREFIX ICOPYIIPLUS and ­ most current RDEX file. We will return MicroProse UTIL.SYSTEM) or a ProDOS file copier and your disks, whenever possible, with the copy all the fIles from both sides ofPirates over current library disk copied onto it. • Requirements to a normal ProDOS disk. Make sure that you Conventional letters must be typed in by name the volumes as IPlRATES.SIDEI and us... when we have the time. DApple IIgs with 2.x ROM upgrade or Apple IPlRATES.SIDE2. Now the real fun part. II w/128K & NMI card If you boot up what you now have, the • When you send your material on disk, o Two (ProDOS) formatted double-sided disks try to use a disk formatted for Apple game will go a little past the title page and give o BASIC.SYSTEM from any ProDOS System DOS 3.3. It makes things a lot easier for you a (believe it or not) "ACCESS ERROR Master us. #1". But didn't we just kill that? Ifyou search o Copy II Plus (or a ProDOS file copier) the disk, you find one occurrence ofthis in the • Address your letters, articles, to: PIRATES.SYSTEM file, but that isn't it. I didn't make a Cookbook at the end, COMPUTIST Search for "1# RORRE SSECCA" (ACCESS because you may just as well read the whole RDEX Editor ERROR #1 spelled backwards) and 10 and article. It will take all of 3 minutes. PO Box l10846-K behold. This is what we want. We find some I played the game for about 8 hours and Tacoma, WA 98411 most curious looking code at $E5J. Let's take nothing funny happened. It would appear that a peek: I got all the protection schemes.

I Novembel' COMPunST #61 7 I -:... '::::-I;1=~-~==" - ]:;~;f; : = : .:.~~ ------

ESI EOR $B8H,X A parting note. If you don't use their of ngs software I ever cracked and they were ES4 INX ProDOS file, the game re-boots as soon as it most helpful: ESS CPX I$FC starts PIRATES.SYSTEM. Since this is no real 1. A 140K floppy or an 800K UNIdisk is ES7 BCC $0ESl (~) problem, don't worry about it. Perhaps there a lot ofinfo to search through. Try to detennine ES9 TAX is a reason other than copy-protection. And for where the protection ISN'T before trying to find ESA BNE $0E6l (+05) IIgs users with a UNIdrive, the disk access goes where it is. This can be accomplished in many ESC JSR $8863 MUCH faster. ways: ESF BEQ $0E90 (+2F) A. If there are files, determine in what E6l ... prints ACCESS ERROR II and loch up *llgs SoftJcey for... sequence that they are loaded. Look for text At first, the above code didn't make much within the startup file to see what files it loads. sense. It looked harmless enough. But if you Pirates! Dgs (PS2 was a file loaded from PIRATES .SYSTEM). turn on double hi-res and type E610, there we MicroProse B. Plant "bombs" in key locations to see see the ACCESS ERROR #1. Here's a little explanation. $E51-E59 verifies the code at • Requirements how far the code gets, if it ever gets there at all. Oood ones are 4C 09 C6 (re-boot), 4C 69 FF $B800to make sure that no one tampered with DApple ngs with ROM 01 (enter monitor) and 29 3A FF (beep). it, (It checks $FC bytes.) If it was tampered Copy n Plus or a ProDOS file copier o 2. Things to look for: 20 ED FD (print to with, it branches to the bomb. Ifit was okay, Two Formatted UNIdisks (one with it executes the code at $B863. It then checks o the screen), AD 00 C0 (strobe keyboard), BD BASIC.SYSTEM on it) the result, and ifit was okay, branched to $E9(/). 8C C0 (disk access), xx 30 C0 (sound), xx No problem. Just patch up the branches a little The technique to crack this was very similar 50 C0 (hi-res or double hi-res graphics), and and it works. Right? . to Pirates! nelllc. In fact, with the exception xx 51 C0 (text screen). Wrong. Take sector editor out and search of the graphics and sound, the program code I hope that these common things to look for for 00 9S 20 63 BS F0 2F or as much as it as you is near identical. And still in BASIC. are of some help to those new to hacking. can. Change the first 0S to 93, and change the First, format 2 disks, one of them should F0 to S0. You could NOP theJSR $B863, but it ® Does anyone have any hints on have the volume name ofIPIRATES and should how to crack or even copy ALIEN MIND for isn't necessary. Boot'up the disk and... nothing. have BASIC.SYSTEM on it. Re-name It locks up, but why? the ngs from PBI. Shelling out $57 for a game BASIC.SYSTEM to PIRATES.SYSTEM. makes one a little uneasy thinking of all the Right about now, I was ready to give up, Enter the monitor with CALL -151. At the but I remembered the code that verified $B800. nasty things that could happen to it. Kindly add monitor (*) prompt, type # to get the CDA it to the Wanted List. Also, ifanyone can copy Was there one to verify this as well? (Ofcourse utilities. there is, but read on.) We trace the file PS3 (the TOMAHAWK, or better yet, crack it, please Boot PIRATES! and listen to the drive. one we just edited) up to it's point oforigin and let the rest of the uninformed world know of After 1 or 2 clicks, press IdslBC land select execution, PIRATES.SYSTEM. Here we find your marvel. Please add it to the Wanted List "Visit Monitor". Enter "\4C (J)(]J some similar code: too. 20\<800.1FFFP" to scan for the JMP (4C99 E9B LOA IH 29) to start ProDOS. I found mine at $9CC. E90 TAX Replace it with 4C 69 FF to enter the monitor Brian A Troha E9E EOR $SS00,X instead of starting. Press 1STI and IUTUIUII EAl INX to quit and let the program execute further. In First of all I would like to say to the EA2 BNE $SE9E (-116) a moment, you will see the monitor prompt. following people: EA4 EOR $090S, X Remove PIRATES! and insert the disk with the EA7 INX re-named BASIC.SYSTEM file on it. Type Jack R. Nlssel (COMPUTIST #56, page 20): EA8 CPX 'BE 2({)({)({)G and you will have their ProDOS and Realm ofImpossibility DOES work on the ngs, EM BNE $0EA4 (~) your BASIC. Insert PIRATES! and type it's EA's protection routine that does not. See EAC TAX CATALOG to verify that this worked. Ifnot, COMPUTIST #50, page 20 and also EAD BEQ $0EB9 (+DA) try again. COMPUTIST #49, page 16 for information on EAF ... htmg for tItI7IiJy Now, either start copy n PLUS with the . how this is done. A salesman friend has asked me to crack several EA programs for him Here we have some similar code that -UTIL.SYSTEM command or start a ProDOS because a customer couldn't get them to run on verifies the verify. They're a tidy bunch at file copier. Be careful not to boot another a ngs. However, the cracked versions run just MICROPROSE. So all we have to do here is ProDOS in the process or what you just did will fine. Keep in mind: there is a second disk check make that BEQ a BRA. Use your sector editor be destroyed. File copy all the files from the at $569 (and $5F8 or $5FE) that should be to find 00 FS AA FS SA A9 2C SO 36 23 or as much PIRATES! master disk onto your own blank looked into. Some ofthe EA programs need the as you can search for. Change the first F0 to disk. This will take quite a while as there are JMP $569 to shut the disk drive off at the end 80. Write it back and you are done! over 1oo files to be copied. of a disk read, so I edit the calls to $5F8 (or Lastly, let's take a look at the catalog. Lastly, whip out ye old block editor and $5FE). Hmmm... We see a bunch of BASIC files. search for SO 2S Bl A2 99 and replace the SO 29 Bl Actually, the bulk of the game that you play with 60 EA EA. The EA's aren't necessary, but! Stephen J. Scalia (COMPUTIST #57, page is in BASIC. No wonder it's so slow. like to be neat. Ifyou don't have a block editor, 27): It's too bad you feel your subscription Somehow, if you could compile it, I think it copy the file PS2 from the backup ofPIRATES! wasn't as informative as you were looking for. would screw up the game something severe. you just made, edit it, and copy it back. Now I started my subscription with COMPUTIST And ifyou are bored, look at the locations in you can enjoy a vastly improved version of #6, at which time I only knew BASIC the LIFE file. They are the memory locations PIRATES! programing skills and didn't know anything that store your stats. And be sure to look in the Also, for the novice hacker, here are a few about cracking software. I still remember the PICK file. tips that I constantly use. This is the first piece excitement I felt when I cracked my first

I 8 COMPUTIST #8t November I -_ ~:..J:~=r·~'~-· -- ~:~#,: : = : _'~:"f:1:~T=L' ------~------program ALL BY MYSELF! Itwas PACMAN non-llgs specific programs. The program protection, the part that changes the byte and (and DIG DUG at the same time) and I used allows you capture up to three programs in your the second part that checks for it. Ifyou want DEMUFFIN plus. Then I thought what I had llgs's extra memory. Although I have not used your computer's BBR in it's original state enter done was simply tried one person's steps for the program that much, I could see where it the following (the back-slashes are very another program, with NO REAL effort on my might come in handy. However I found a few important): part. Since then, I have learned so many things about the program I didn't like, and one different steps that I can adapt to most protection thing that is FLAT OUT WRONG! \"4 "" "" FF "" FB liB 113\U schemes to overcome them. Now I can write First the program is supposed to be a classic This is a tool call to WriteBParam from the those nifty articles I used to read and think "Boy desk accessory (CDA) that can be accessed monitor, this call changes the byte back and this guy is really smart, I wish I could do that!" from the control panel. RWP did not follow the updates the four byte checksum of the BBR. That was about 4 years ago, it has taken correct format for CDAs, a CDA is type $B8 Now your llgs should have the BBR in it's a lot ofwork to get where I am today. Although (not type $B6) and should be found in the original state and SS should still work. I don't think you (Stephen J. Scalia) will ever DESK.ACCS subdirectory and not in the This is an INCOMPLETE softkey, the end up reading this, but I think COMPUTIST TooL.SETUP subdirectory. install feature will not work on a copy of the will give each reader exactly what they put into Lastly the program is copy protected, but Softswitch disk without the error, ifanyone has it. If you really want to learn about disk in a form that must be illegal in some way, if the fix for that part of SS please let us know protection read ALL the articles making sure it's not illegal it should be! The program disk about it by writing in. Although I had this you try to understand the longer ones as they has two unformatted tracks, leaving twenty-four incomplete crack about a year ago I didn't want have lots ofinformation in them. I have learned blocks unusable, but that's not that bad. The to send it in unless I had the whole thing. Well so much from reading COMPUTIST (and of real problem occurs when the disk protection I have don't have enough time to work with it course othermags),I am glad I'mable to return passes! The program proceeds to alter a byte so I am asking for help from some ofthe other the favor and send in articles for other readers in the BATTERY BACKED UP RAM (BBR). readers that have this program. to learn from. RWP has NO RIGHT to physically alter Now on to the softkeys: anything in my computer that would not be *llgs Softkey for... changed back when the program is exited. The Fix for EDD 4 byte at E1I03BB is changed from a FF to a FE, Mavis Beacon Teacbes Typing then the program checks for it like this: For some odd reason there is a "lone byte" Software Toolworks that seems to affect the way EDD 4 runs on a A9 FB ell LOA #$II11FB $2C0+FB =3BB llgs. Although I have not used EDD 4 in 2 or OA PHX • Requirements 3 years (softkeys doa much better job!) I was 48 PHA able to find the bad byte. To fix your copy of A2 113 IIC LOX #$IICII3 Tool call ±3OC, read abyte from o 512K Apple llgs EDD 4 try this: BBR o 3'h /I disk copier CALL ·151 221111 "" o 3'h" disk editor ILOAD EDD 4 or what ever you called it El JSL EI"""" Tool1ocalor call o 2 blank disks AAII.AA73 68 PLA Mavis Beacon Teaches Typing (MBTT) is Write down the bytes found at $AA61 & 29 113 "" AND #$"""3 4A LSR a typing tutor with a very neat race car typing $AA60 together and at $AA73 $AA72 & game. The program comes on two 3'h" disk together in that order. These are the length and F" 112 BEQ +112 Never IfJken with the program disk having an unformatted starting address for binary files under DOS 3.3 9" 43 BeC +43 Clear carry = pass track (track $4F, side 2) which leaves blocks only. Now type: Since the Branch on EQual is never taken, $63A through $63F unusable. Below I will I changed it to (NOPand CLC) so the next 1r4l:1A was 02 EA 18 explain the Oong) way I tracked everything BSAVE EDD 4,A$DD, L$JnJ branch is always taken. Let them mess up their down. own computers if they want, but leave mine First I started by making a copy of both Where xxxx is the two byte hex number alone! When Apple Inc. reserved this memory disks using Copy II Plus v8. The program disk you found at $AA73 & $AA72, and yyyy is the I hardly think they reserved it for RWP. What number from $AA61 & $AA60. gave read errors for blocks $63A through $63F, if 1(J)0 people wrote programs that did this? That should take care of any problems This type of protection only breeds while the data disk would copy without any people are having with EDD 4 and my article errors. Going to the bitcopy portion of incompatiblity down the line. Well I did fmd 3'h" from COMPUTIST #49. Copy II Plus I used the sector editor to scan a way around this protection and a way to change your computer back to it's original state. the disk for 22 A8 "" El 22 which is the code for *llgs Softlcey for... To unprotect the file "TOOL.SETUP.2" make a ProDOS 16 block read. I found this string once on block $3E7. Once I located this code the following block edit (on a copy only): Softswitcb I checked it out and found it gets some Block Byte(s) From To Roger Wagner information, makes the block read, stores a $111 $1C7 FII "2 EA 18 value at $AI5, then returned. • Requirements I traced back to the first RTL (6B) before Using the book "Inside the Apple llgs" by the code and changed the three bytes after that DApple llgs 512K Gary Bond I was able to look up all the values to 68 FA "0; which is PLA, PLX, BRK (this is o 3'h /I disk copier in the BBR and check for the altered byte. The what I call hitting the BRAKES). I wrote the o 3'h /I disk block editor book also gives the tool call number for reading block back to the disk and booted it, when the and writing to the BBR. There is also a call that program crashes (press laTI to get to the text The Softswitch (SS) program put out by sets the BBR checksum if you change one of page/mode) you can see where the program Roger Wagner Publishing Inc (RWP) could be the bytes directly. So I searched the disk for jumped from. The Accumulator will hold the a very useful program ifyou worked with many each of these and found both parts of the address (less the length of the instruction) and

I Novembe.. COIiPUTIST #61 9 I . _ -- ~~-I;T= f:~ ¥-: _ __ ~:l=I: -=- - ~ _ ..:-.. .- ~~

------~ ------the X-register 00 byte) will hold the memory 6CA5:A8 TAY *llgs Softhy for... block. 6CA6:00 12 BNE 6C8A (+12) Not zero, then Using this method it's easy to tell the call COIIIinue was made from $03/03EE. When checking this 6CA8:F4 1700 PEA 0017 Magical Myths I Unicorn Inc. new code you will notice the following things: 6CAB:F49100 PEA 0001 The routine runs from $03/03A0 thru 6CAE: F4 C5 64 PEA 64C5 I-- • Requirements $03/04B9. The call made to $031D5FB (made 6CBl :22 4C 3A 04 JSL 043A4C Goto insert master once) is to a routine that gets the device number routine o 768K Apple llgs to use in checking for the bad blocks. The calls 6CB5:7A PLY o 3th" disk copier made to $031D5BB (made three times) is to the 6CB6:7A PLY o 3th" disk editor actual block read routines. After each call is 6CB7:7A PLY o Two blanks 3th" disks something like (found on block $37F): 6CB8:80 OF BRA 6C99 (-21) Go back and liD LOA 0A15 check again Magical Myths (MM) is an educational 6C8A: 78 TOC Must be an original program that teaches Greek mythology along CUP #0000 No error (eilhtr devict IJUlllber or block read) BEQ CONTINUE 6CBC:18 CLC with teaching basic reading and reading comprehension skills. The program makes use LOA #0000 Lood Accum with failed value 6CBO :69 F8 00 AOC #00FB BRL FAILED 6CBF: IB TCS oflimited speech and good graphics with mouse 6CC0:28 PLO control. The program comes on two 3th" disks 6CCI :68 RTL Retum to sender and uses nibble counting (on tracks $20 and CONTINUE code To bypass this step I changed the JSL $21) on the program disk for copy protection. LOA #0001 Lood Accum with ptJJsed value $([)3/03A0 to LDA $([)3/03A0 and the BNE Magical myths is published by the same TAY 1his is where the 'BRL FAILED' comes to $6CBA to BRA $6CBA. The edits to the disk company that puts out Aesop's Fables and uses CLC are: almost the exact same protection routine. Like AOC #00F7 the other Unicorn program ifyou search for A2 TCS Block Byte(s) From To 20 A0 01 you would findthecopy protection. The TYA $383 $93 22 AF code is on block $IEE and it looks like: PLO $9A 00 80 14B:E230 SEP #308 bit Accum RTL FUUJlly retum to sender 140:A221 LOX #21 TI'IIIf $21 The above edit will produce a completely I made the following changes: 14F: A0 01 LOY #01 011 side 0IIt cracked version of MBTT as did the first edit OIeet Block Byte(s) From To I showed. The routine at $([)3/6C8E seemed 151 :20 3F 6A JSR 6A3F for the original 154:803B BCS 191 (+3B) 011 error goto 191 $37F $2A 22 AF very short and didn't return any special values 156:E0 B0 CPX #80 $33 C9 00 90 F9 96 EA EA EA EA EA so I tried the BRAKE trick one more time and A909 A991 was rewarded with the following (at 158:98 TVA $7B 22 AF $04/957C): 159: E9 10 SBC #10 Compare to WOO 158: 90 2C BCC 189 (+2C) Too low?, goto 189 $84 C9 90 99 F0 06 EA EA EA EA EA 957C:7A PLY 150:E078 CPX #78 A999 A901 9570:8E 7909 STX 0979 $A9 22 AF 9580: 80 77 99 STA 0977 15F:98 TYA $B2 C9 09 90 00 05 EA EA EA EA EA 9583 :22 8E 6C 03 JSL 036C8E Goto the s/Qrt of the 160: E9 IE SBC #IE Compare to 1£18 A900 A901 proltctioll 162: 80 29 8CS 180 (+29) Too high?, goto 18D $06 22 AF 9587: F4 90 09 PEA 0909 164:A220 LOX #20T1'IIIf $20 $OF C9 00 00 F0 95 EA EA EA EA EA 958A:22 F168 03 JSL 9368Fl 166:A091 LOY #91011 side 0IIt A9 09 90 80 03 EA EA EA EA EA There you have it, three different ways to 168:20 3F 6A JSR 6A3F OItetfororiginal This works fine (producing a cracked crack MBTT at three different levels. Once 16B:8024 BCS 191 (+24) 011 error goto 191 version), but I thought there was a better way again this is an example that shows·there are 160:E040 CPX #40 using less edits. Again applying the BRAKE many ways to do the same thing. To softkey 16F:98 TVA trick I was able to back-trace the protection one MBTT simply follow these easy steps: 170: E9 IF SBC #IF Compare to 1F~ more step and came up with the following code IT] Make copies of both disks (ignore 172:9015 BCC 189 (+15) Toolow?,gotol89 at $03/6C8E thru $03/6CCI: errors on blocks $63A-$63F on the program 174: E0 08 CPX #08 6C8E:0B PHD disk) 176:98 TVA 177 :E9 20 SBC #20 Compare to 2008 6C8F:38 TSC [TI Make the following change to the 6C90:38 SEC copied program disk: 179:8012 BCS 180 (+12) Toohigh?,goto18D 6C91 :E9 F8 00 SBC #90FB 17B:A900 LOA #00 Everything ptJJSed 6C94:58 TCS 8lock Byte(s) From To 170:48 PHA 6C95: 69 F6 90 AOC #09F6 $4B9 $197 22 AF 17E: 22 9A 6B 90 JSL 09680A Print 'PLEASE WAn' 6C98: IB TCS 182:A900 LOA #90 6C99 :F4 3A 06 PEA 063A First IxxJ block to look NOTE: You could also apply the other 184:EB XBA for edits, but they are not needed. 185:68 PLA 6C9C:F49100 PEA 9091 [I] Write the block back to the copy. 6C9F: 22 A0 93 03 JSL 9303A9 CaU to the code 186:28 PLP Store the originals in a safe place. described above 187:AB PLB 6CA3:7A PLY Optional: Upload the program to a hard 188: 68 RTL Relllm to sender 6CA4:7A PLY drive. "Fail code slfUtS here"

I 10 COIiPUTIST #81 ~ -- ;.~:T=-- i .~ ~_. ~ __ ]: :1 :I: ~ - - = : _ . ~ : : ~ ~~ i T~ [: .

------~------

If you change the LDX #21 (A22l)at$14D 1E7: E9 21l SBC #21l Compare to 2008 However when the patch is used (on block to BRA $17B (89 2C) then MM no longer checks lE9:B1l12 BCS lFO (+12) Too high?, goto 1FD $2ED) for KQ2, the program would load about for the original and continues to load. The only lEB: A9 "" LOA ''''' Everything parsed S0% then bomb into the monitor. Now you thing left is to make the change permanent. Try 1EO:48 PHA must go back and trace the actual block read these easy steps: lEE: 22 76 6B "" JSL 1196B76 Print 'PLEASE WAlT' code and look for some type of flag. After 1F2 :A9 911 LOA #911 searching for 34 116(the number ofthe bad block) o:::J Copy the 3Yl" disk 1F4:EB XBA I found it twice on block $2C4. Checking this u=l Make the following edits to the copy: 1F5:68 PLA code revealed two values (911112 27119) are stored Block Byte(s) From To lF6:28 PLP in consecutive memory. The value 91127 is the lF7:AB PLB code returned for a block read error by the $lEE $140 A221 892C lF8: 6B RTL //etum 10 sender protocol converter and ProDOS 16. So ...... "Fail code is here" searching for C9 27 would reveal the this "check IT] Write the block back the copy. If you change the LDX #21 (A2 21) at ofthe disk check" on block $267. If the 112 27 $IBD to BRA $IEB (89 2C) then TAN no wasn't found then a JSL was made to some *IIgs Softlcey for... longer checks for the original and continues to subroutine, changing this to a LDA results in load. The only thing left is to make the change a cracked version of KQ2!. Tales from the Arabian Nights permanent. Try these easy steps: If you use Copy II Plus vS to search for Unicorn Inc. 99 Fll 94 22 llil 911 911 22, when the sequence is o:::J Copy the 3Yl" disk. found, the cursor will be on the byte the needs • Requirement!! o=J Edit the copy. to be changed. The same exact sequence is on the four (4) forementioned programs and the D 76SK Apple IIgs Block Byte(s) From To same change will work for each, however D 3Yl n disk copier $553 $lBO A2 21 8112C King's Quest II does require an addition patch. D 3Yl" disk editor When checking a copy ofPolice Quest (also by Sierra) I cound not fmd the above code or any D Two blank 3Yl" disks IT] Write the block back the copy. protection routine for that matter. The softkey Tales From the Arabian Nights (TAN) is for both KQ is as follows: *IIgs Softlcey for... an educational program that teaches old tales Make a copy of all the disks, ignore from the middle east along with teaching basic o:::J errors on block $634. reading and reading comprehension skills. The King's Quest / &0 program makes use oflimited speech and nice Sierra On Line o=J Make the following change (on the graphics with mouse control. The program copy of disk one only): comes on two 3Yl" disks and uses nibble • Requirements For King's Quest - Quest for the Crown: counting (on tracks $20 and $21) on the program disk for copy protection. TAN is D 512K Apple IIgs Block Byte(s) From To published by the same company that puts out D 3th" disk copier $AlJ $BB 22 AF Aesop's Fables and Magical Myths and also D 3 11.1" disk editor with search ability uses the same protection routine. Like the other For King's Quest II - Romancing the King's Quest I and II (KQ) have been re­ two Unicorn programs, ifyou search for A2 29 Throne: released in a IIgs format, with the same type A9 91 you would find the copy protection. The of cartoon graphics as the 12SK Apple II code is on block $553 and it looks like: Block Byte(s) From To versions. It is sad that Sierra has overlooked $267 $166 22 AF 1BB:E239 SEP #3118 bit AcCIIIII the potential of the IIgs, they should have put $2EO $BF 22 AF 1BO:A221 LOX #21 Trad $21 some effort into the graphics. Well, to continue, 1BF:AlJ 91 LOY #91 011 side 0IIt the protection is the same as on 1C1 :29 AB 6A JSR 6AAB 0Jed: for tht original and Leisure Suit Larry. The program comes on IT] Write the block back to the copy. 1C4:B93B BCS 1FF (+3B) On error goto 1FF two 3Yl" disk, with both disks having an error Optional: Upload the whole program to a 1C6:E9 B9 CPX #B9 over block $634. After checking the code on hard disk. Store the Original in a safe place. 1C8:98 TVA both KQ disks, and that ofthe other two Sierra 1C9:E91O SB(; #10 Compare to IDB0 programs I found a common section of code Softkey for... 1CB:9112C BCC 1F9 (+2C) Too low?, goto 1F9 (along with the edit to crack them). All four 1CO:E1l78 CPX #78 disks have this same code (on the disk it looks Defender ofthe Crown lCF:98 TVA like): Cinemaware Inc. lOO:E9 IE sac #1 ECompare to 1E78 102: Bll29 BCS 1FO (+29) Too high?, goto 1FD 2299"" 119 JSL ""911911 l04:A22ll LOX #29 Trod: $20 C9 91 911 CYP 9119l • Requirements Fll 94 BEQ (+4) lD6:AlJ 91 LOY #1l1 011 sidt 0IIt 22"" 911 99 JSL 911911911 D 76SK Apple IIgs 108:29 AB 6A JSR 6AAB Check for original D 3th" disk copier 22"""" 911 JSL 91199911 "22 MUST be chged to Ai" 1DB:Bll24 BCS IFF (+24) On error goto IFF D 3th" disk editor lDD:EIl411 CPX #49 AE 911 911 LOX 911911 AD911 911 lOF:98 TYA LOA 911"" Defender of the Crown (DOTC) is a OA PHX lEll:E9lF SBC #1FCompart to 1F40 GREAT new program from Cinemaware. This 48 PHA 1E2:911l5 BCC lF9 (+15) Too low?, gOlo 1F9 is the first program in a whole line of "Playable 1E4:E9 liS CPX #98 These bytes can be found on block $A0 Movies" (Cinemaware even calls the disks 1E6:98 TYA for KQ1. The patch makes a cracked copy. "reels") ported from the Amiga and the Mac. I November COIiPUTlST #81 ttl _ ~- ~ ';'~:T;: f~i 4-- ~ _ ~~l~: -- = __ .; _:-~::L:~ ------

While these programs are memory hungry This one seems real easy to crack, just think due to the amount ofgraphics and sound used, about it. First the code stores a zero in the flag Edward Teach these new programs set a new level of quality and goes to the nibble count, then when it and hopefully a new standard for the IIgs. The returns checks the flag for a zero. Ifyou change object ofthe game in DOTC is to gain control the JSR (21il) at 14 to a LDA (AD) the code stores While I've got your attention, I've got ofthe whole region by waging war in the eleven a zero in the flag, loads a value and then checks something to say. In issue #56 (page 29) the hundreds. DOTC does live up to it's reputation the flag for a zero! You could also change the RDEXed states that there are about 6000 with great graphics and music, the game also BEQ (FIil) at 1A to a BRA (81il) just for the sake subscribers to COMPUTIST. My question is, uses the mouse for control which makes for easy ofcompleteness, although it's NOT needed. If What are the rest ofyou doing? I have been a past playablity. for some reason you cannot find the above code subscriber since last September. In the year first The program comes on two 3'h /I disks and on block $258 you could search your disk for I have submitted several articles. My article uses nibble counting on tracks $20 and $21 of 9C El17 21il E317 AOEl17 and change the 21iltoAD. was one entire page on how to find a jump to disklreel one. So again, we encounter that same To crack Defender of the Crown follow these $C600. Itwasn't the best work that I have ever "old" comercial disk protection scheme. Ifyou easy steps: done, but at least I contributed. get out your disk searching utility and search But what really bothers me, are the people for A2 21il Alillill or A2 21 Alillill you will find the [TI Make copies of both DOTC disks. who give 38 softkeys by saying change byte A offending code (on block $258). The code CD Make the following edits on a copy of to B and don't give any indication how they should look like this (as it is on the disk): disk 1. found what to change. Ifyou want to know how to write, look at the articles by Brian Troha, 1il3 :F4 Iillillillil PEA Iillillillil Block Byte(s) From To Jim Hart and Charles Taylor. Even on the 1il6: F4 Iillillillil PEA Iillillillil $258 $14 21il AD simple cracks they all still found something 1il9 :A2 IilC 22 LOX #221ilC "extra" to say about the disk. IilC: 22 Iillillillil E1 JSL E11il1il1il1il I also got a friend to subscribe and he got 11il:68 PLA [I:] Write the block back to the disk. another friend to subscribe. This is why I can't 11 :9C El17 STZ 17E1 SlOre apass value in the jlag Optional: Upload the whole program to a understand why we have a MOST WANTED 14: 21il E3 17 JSR 17E3 Go 10 the protection rollline hard disk. UST. With 6,([)([)([) people, out there, why can't 17:AOEl17 LOA 17E11JxJdthejlag we get together and overcome a few protected 1A: FIil1il3 BEQ IF (+1il3) Ifzero then colltinMe Softkey for... disks? And boost the number ofsubscribers in 1C:4C 64 17 JMP 1764 GoIO /NSEKI' MASTER msg the process. I hope I did not offend the regulars, 1F:22 72 9C Iillil JSL 1il1il9C72 and to the other 5([)([)([)+ it won't matter... you 23: 4C 26 18 JMP 1826 Go 10 the start of the program Adventures of SiDbad never write anyway. 26 :Iillillillil Iillillillil This is 17E1 when loaded in Unicorn Inc. 28: 1il8 PHP Start of the protection rollline DOUBLE DOS • Requirements 29 :E2 31il SEP #31il 8bit ACCIIIIIUlator I was working on a softkey for a disk that 2B :A2 21il LOX #21il Track $28 o 768K Apple IIgs has already appeared in several past issues of 20:AIil1il1 LOY #1il1 o 3'h /I disk copier COMPUTIST. The other cracks all poked an 2F: 21il FF 17 JSR 17FF CoIUII them up o 3'h /I disk editor 18 into $B942 and copied the disk. A few sector 32: BIilIilB BCS 3F (+IilB) carry set = failed o Two blanks 3W' disks edits later the COPYA disk was finished. On 34:A221 LOX #21 Track $21 my version there were 11 different address 36: AIillill LOY #1il1 Adventures of Sinbad (AOS) is an prologues and two different data prologues. 38: 21il FF 17 JSR 17FF CoIUII them up educational program that uses Sinbad's Simply poking $B942 wasn't going to work. 3B:B1il1il2 BCS 3F (+1il2) Carry set =failed adventures to teach basic reading and reading My first attempt was to write 11 different 30:28 PLP comprehension skills. The program comes on controllers and at least get a COPYA version 3E: 61il RTS Retum to sendlr two 3W' disks and uses nibble counting (on for experimentation. I did manage to make the 3F:EE El17 INC 17E1 Failed so mess up thejlag tracks $20 and $21) on the program disk for copy, but a large amount ofthe code was 'junk'. 42:28 PLP copy protection. Like the other Unicorn Apparently the disk was encoded. After some 43 :61il RTS And return to sender program ifyou search for A2 21 AIillill you would searching I discovered that the read translate 44:8E IE 18 STX 181EStartoj'ColUllthemup' find the copy protection. The actual disassembly table was altered. Copying the copy, using their 47:8C IF 18 STY 181F is so close to other Unicorn products I didn't read table, produced a disk with good code that 4A:5A PHY think it would be worth repeating. died horribly during booting. You have 4B :OA PHX Push track IIJIIIIber probably noticed that there are not 11 Ifyou change the LDX #21 (A2 21) at 103 controllers at the end ofthis article. Filling the 4C: F4 Iillillillil PEA Iillillillil to BRA 131 (81il2C) then AOS no longer checks 4F:F42118 PEA 1821 Push more data. pages ofCOMPUTIST with all ofthese did not for the original and continues to load. The only seem to be the best way to present my program. 52: 22 8F 9C Iillil JSL 1il1il9C8F To IJCIIUll COIUII routine. thing left is to make the change permanent. Try 56: 80 21il18 STA 1821il SlOre retllrned value While trying to get around this problem I these easy steps: remembered several other items that I have 59:68 PLA [TI Copy the 3'h" disk. worked on. (Broderbund and Electronic Arts 5A:68 PLA releases). These disks are all protected in the CD Make the following edits to the copy: 5B:68 PLA same way. A table of header bytes is 5C:68 PLA Block Byte(s) From To constructed then when a "read" is performed 50:68 PLA the headers are located in the table and placed 5E: 68 PLA Pull all extra values $47A $11il3 A221 81il2C in DOS. Using this theory all I had to do 5F:AO 21il18 LOA 1821il Get the returned value (ALL?) was rewrite the DOS read routine, 62: 61il RTS Retum to sender [I:] Write the block back the copy. construct header tables and place the header

I 12 COMPU'nST #81 November I ___ -- ~~:1~[:~¥· __ - J::.l~~ __ =- H_=_ ~ _ ~.~_:~~~~'L:'[" ------~ --- ~------~---- infonnation in the new read code. The premise 8995: JMP $899A jump to new read also a good idea. ofthe code is to read dri:ve 1 with the protected 8998: CLC As a final note we need to modify SUPER DOS and drive 2 with DOS 3.3. This is my first 8999: 69 lOB 1.5 so only 5 tracks are read at one time. attempt at writing assembly code, so if it This code modifies the nonna! DOS read Reading more overwrites the code we just appears a bit cryptic, bear with me. The heart routine ($B944-$B99F) then relocates it to entered. Do the following to the SUPER lOB: of the code is DOUBLE.OBJ: $809A. Next the diverter section is moved LOAD SUPD lOB 1.5 8000: LOA #$18 POKE normal (from $8026-$8(52) to replace the $B944 lM75 IF PID(474Z8) =1. 1II1II .. = 8002: STA $B989 DOS to code. Finally six tables are created (or at least ttl: GOTO lH1S 8805: STA $B992 ignore identified) that will hold the header infonnation. 1-... = 151 8008: STA $B99C errors. Now when DOS tries to read the disk our 11185 BOlli: DOS =1.: DS=..1111.... 800B: LOA #$60 diverter will determine the drive being accessed ~1111Z1314151.17181ItAlI1C 8000: STA $B98A and route the code to either the 'nonna! read' lDlI1ne2UZ" 8018: STA $B993 or the 'protected' read. The new $B944 code SAVE SUPD 1011.5 8013: STA $B990 saves all the registers, and reads memory This change will peek in memory to see if 8016: LOX #$09 Move $B944 location $35. The current drive number is stored Double DOS has been installed. Ifit has then 8018: LOA $B944 ,X to as the high bit ofthat memory location. Ifthe the MB parameter is lowered to copy only five 801B: STA $889A ,X $809A bit is not set (l) then drive one was the last tracks, ifnot then the normal seven tracks will 801E: INX accessed, ifset (0) then drive two was the last be copied as usual. This change is completely 801F: CPX #$5C disk accessed. This would appear to be transparent to you when running the program 8021: BNE $8818 backwards. (l = not set, 0 = set). Anyway, and once entered will automatically handle my 8023: JMP $8855 Jump to next move the code either jumps to the read table code at program when ever it is in memory. To find 8026: STY $9890 StoreX,V,A $8(1)65, or pokes the normal the proper bytes to store in the tables you will 8029: STA $9891 'D5AA961D5AAAD' into DOS and then jumps need a pencil, paper and a nibble reader. (Iuse 892C: STX $9092 to our relocated read routine. the 'N' function ofLocksmith 6.0). Nibble read 802F: LOA $35 Get drive # Just in case I lost the beginners, what all track $00 and write down the Address and 8031: ANO #$89 turn off bits this means is the codewill now read whatever Data prologue bytes. Then repeat the process 8033: BMI $8852 DR:1?/then jump headers you tell it to on drive one (D4AA96 for the entire disk. Now, run Double DOS and 8035: LOA #$05 for example, or even 9796EB). DOUBLE DOS enter any changes into the correct tables. If, for 8837: STA $B8E7 store norma I can handle up to eighty different headers on a instance, all the first bytes of the Address are 803A: STA $89AB values in 5.25' disk. Also, ifyou had any trouble writing the nonna! "05"'sthenskiptableoneandgoon 8030: LOA I/$AA DOS controllers, now the simplist controller will to table two, ifthe second bytes are all "AA"s 883F: STA $B8F1 function without problem. No more trying to then table three... 8842: STA $89B5 write controllers that read one track with one I know that this is a lot to key in, however 8845: LOA #$96 * DOS * header and the next track with a different I find it a useful tool in deprotecting programs. 8847: STA $89C9 * OIVERTER * header. The tables relate to the six header bytes: 804A: LOA I/$AD 884C: STA $B8FC Tablell Byte Start of Table DOUBLE DOS 884F: JMP $898C normal read 1 05 $89F6 2 AA $811F 19 REM SET UP VARIABLES 8852: JMP $8965 protected read 20 OIM H$(49) 8955: LOX #$99 3 96 $8148 4 05 $8171 39 F$(l) : "05" :F$(2) : "M" :F$(3) = "96" 8957: LOA $8926,X Move code from :F$(4): "05" :F$(5): "AA" :F$(6): "AO" 895A: STA $B944,X $8926 5 M $819A 49B$(1): "05'AA'96" :B$(2): "05'M"96" :B$(3) 8850: INX 6 AO $81C3 : "05'M'96" :B$(4): "05'AA'AO" :B$(5): 895E: CPX #$39 to Each table is forty bytes long to accomodate "05'M'AO" :B$(6) : "05'M'AO" 8969: BNE $8957 $B944 40tracks per disk. Ifthe disk has only 35 tracks 8962: NOP the program will still function. It just ignores 59 X=1 60 J$(l) : "05" :J$(3) : "96" :J$(6) : "AD" 8963: NOP the last few tracks. 70 J$(l) : J$ (1) +"05" :IHEN (J$(l)) 80TH EN 8864: RTS The Applesoft part ofDouble DOS serves < 8965: LOX $0478 get t rack number as an easy method to input the tables. The 79 8968: LOA $80F6, X (05) tab lei majority of the code is for input. The code 80J$(3):J$(3) +"96" : IFLEN(J$(3)) <89 THEN 896B: STA $80AB new read code builds six strings J$(X) (X = 1 to 6), converts 89 90 J$(6): J$(6) +"AO" : IFLEN (J$(6)) <80THEN 896E: LOA $81lF I X (AA) tab Ie2 the strings to hex bytes and pokes them into 8971: STA $89B5 new read code memory. I tried to make this as painless as 99 8974: LOA $8148,X (96) table 3 possible. However, writing a full screen editor 199 J$(2) : J$(2) +"AA" :IHEN (J$(2)) <80THEN 8077: STA $89C9 new read code is less than fun. Other than the four arrow keys 199 807A: LOA $8171,X (05) table4 for cursor movement the only other keys that Ill' J$(4) =J$(l) :J$(5) : J$(2) 8870: STA $B7E7 no rma I DOS you need to know are IESC I to exit the editor, 120 POKE 47426,24 8080: LOA $819A ,X (AA) table 5 and (§iI to write the new tables to memory. 139 REM BLOAO DOUBLE .OBJ ANOCREATE SIX TABLES 8083: STA $B8F1 no rma I DOS After entering all the tables (you can skip the 149 PR INT CHR$ (4) "BLOAD" DOUBLE. OBJ " 8086: LOA $81C3 ,X (AO) tab Ie6 ones you don't need) and pressing @jJ , drive 159 CALL 32768 8989: STA $B8FC no rma I DOS one will no longer be able to read DOS 3.3. 169 FOR X=33914 TO 33054: POKE X,213: NEXT 808C: LOY $9009 restore Y Any program that you need to load MUST be 179 FOR X=33955 TO 33995: POKE XI 170: NEXT 898F: LOA $9981 restore A loaded from drive two. Donot forget to remove 18SFORX= 33096 TO 33136: POKE X,159: NEXT 8992: LOX $9992 restoreX the disk from drive two. A write protect tab is 199 FOR X: 33137T033177: POKE X,213: NEXT

I NOV8IDbeI' COIIPUTIST #61 13 -- _~:-I~I~I:]_~' ~_ _ ]:~1:I=- __ =- = __ ~_ ~-; ~ ------~- ~ - - ~------~ - --~-- - ~------~-~--- -

290FOR X= 33178 TO 33218: POKE X,179: NEXT 6191 FAS =CHRS (11) AND ((H =19) OR (H =18) OR 199 - $1900 699 - SFE1C 210FOR X= 33219 TO 33259: POKE X,173: NEXT (H =26) OR (H =34») THEN H=H-l:C =C-1 119 - SF2C8 619 - S59A3 229 X=1 629 IFAS =CHRS (11) THEN V=V-I:C=C- 2: 1F 129 - S8C74 628 - S711A 239 CALL - 936 V<5THEN V= 14:C =C+ 29 139 - S7EC8 638 - S489D 249 REM SET UP INPUT SCREEN MASK 639 IF AS =CHRS (11) THEN 679 149 - SBBED 649 - SB380 258VTAB 1: HTAB 14: INVERSE: PRINT "'DOUBLE'OOS' 649IFAS=CHRS (18) AND ((H= 19) OR (H= 18) OR 158 - SAE43 659 - S2488 ": NORMAL (H= 26) OR (H= 34» THEN H= H-l:C =C-1 168 - SEFE2 669 - SF888 268 VTAB 3: HTAB 99: PR INT "WR ITIEN'BY'EDWARD' 658 IFAS =CHRS (18) THEN V=V+1: C=C+2: IF 178 - S9548 679 - SFB1C TEACH" V> 14 THEN V= 5:C =C- 29 189 - SEA95 689 - S6669 279 VTAB 5: HTAB 6: PRINT "00-..•..9A-·....14-· 668 IFAS = CHRS (l9) THEN 679 199 - $19AB 699 - SFFCIJ ....lE-" 6791 FAS =CHRS (98) OR AS =CHRS (21) OR AS =CHRS 298 - S8D7F 700 - SF353 289 VTAB 6: HTAB 6: PR INT "91-..•..9B-....·15-· (l1J) OR AS = CHRS (11) THEN 739 219 - S354B 719 - SC914 ....IF-'' 689 1FAS =CHRS (27) THEN 439 229 - S188B 729 - S59E8 299 VTAB 7: HTAB 6: PRINT "92-·....9C-..•..16-· 699 HTAB H: VTAB V: PRINT AS 239 - SA739 . 739 - S47C2 ....29-" 71J1J IFC= 1THEN JS(X) =AS+RIGHTS (JS(X), LEN 241J - SBA1A 749 - S736E 399 VTAB 8: HTAB6: PRINT "93-....·9D-....·17-· (JS(X» - 1): GOTO 729 259 - S2154 759 - SBC5F ....21-" 719 JS(X) = LEFTS (JS(X), (C - 1» + AS + MIDS 261J - S49FF 769 - S913D 319 VTAB 9: HTAB 6: PRINT "94-.....9E-.....18-· (JS(X), (C+ 1» 271J - S15BF 779 - S9088 ....22-" 721J GOSUB 769 281J - SA684 789 - SE380 321JVTAB19: HTAB6: PRINT "95-·....9F-....·19-· 731J GOTO 529 299 - SBBA5 799 - S3A93 ....23-" 749 X=X+ 1: IF X>6 THEN X=1 399 - SC672 899 - S382A 339 VTAB 11: HTAB 6: PRINT "96-.....19-·....1A-· 751J GOTO 439 319 - SD53A 819 - S6551 ....24-" 769 B=H:N =V 329 - SCB20 82fil - S46FB 349VTAB 12: HTAB6: PRINT "97-....·11-·....1B-· 77fil H=B:V = N: RETURN 339 - SD96E 838 - S5A89 ....25-" 789 X= 1: R= 1: Z=33914 349 - SEF17 849 - SE84E 359VTAB13: HTAB6: PRINT "1il8-·....12-'"''1C-' 799 IFNOT F(X) THEN 950 359 - SFB6F 859 - $l8ED ....26-· 80HOR P=1TO 40 36fil - S8692 869 - S96B7 369VTAB14: HTAB6: PRINT·09-..•..13-....·1D-· 819 HS(P) =MIOS (JS(X) ,R,2) 370 - S8926 870 - S7EBA ....27-" 820 R=R+2 380 - S5070 889 - S5FBB 37filVTAB16: HTAB15: PRINT BS(X) 830 NEXT 399 - S918B 890 - S702A 389 VTAB 18: HTAB 15: PRINT "TABLE->' X 849 REM CONVERT DEC TO HEX 400 - SBC35 900 - S3B16 390 U=5: I =09 858 R=1 4HJ - SAA28 910 - SFfil59 429 920 408R=1 86HOR E=1TO 40 - S9E79 - S4176 41fil FOR Q=1TO 1fil: VTAB U: HTAB I: PRINT MIOS 870 SS =LEFTS (HS(E) ,l):T$ =RIGHTS (HS(E) ,I) 439 - S7518 930 - S836F (JS(X), R,2) :U=U+ 1: R=R+2: NEXT 889 IF SS =>"A" ANOSS <="F" THEN H=ASC (SS) 440 - S8861 940 - SFElD 429U=5:1=1+8: IF I <35 THEN 419 - 55: GOTO 990 459 - S7fil07 951J - S7739 460 969 - S6EBF 439 VTAB 29: HTAB 5: PRINT "OO'YOU'WANT'TO' 899 H=VAL (SS) - S9006 478 978 CHANGE' THE' " ;: INVERSE: PRINT FS(X): 990 IF T$ =>"A" AND T$ <="F" THEN M=ASC (T$) - SC2DD - SFCE7 NORMAL - 55: GOTO 929 489 - $18B9 989 - S631C 498 998 - S8847 448 PRINT 918 M=VAL (TS) - S59FF 588 - SAB89 459 PR INT ,,·....•....•....·YIN" ;: GET AS 929 NU =H* 16 + M 461J IFAS="N"THENX=X+1: IFX>6THENX=1 939 POKE Z+ (E - 1) ,NU 479 IF AS = "Y" THEN 518 949 NEXT DOUBLI.OBJ 489 IF AS = CHRS (23) THEN 789 958 Z=Z+41: R=1 498 GOTO 379 969 VTAB 23: HTAB 5: PRINT "'INSTALLlNG'TABLE' 8988: A9 188089 B9 80 92 B9 S882F 51J9 REM SCREEN ED ITOR "X 8898: 80 9C B9 A9 61J 80 8A B9 S898B 518 H=9:V =5:C = 1: F(X) = 1 978 X=X+ 1: IFX<7THEN 799 8918: 8093 B9 8090 B9 All 98 S7B7l 529 HTAB H: VTAB V: GET AS 989 HOME : PRINT "DRIVE' ONE' WILL' N34THEN Checksums 8848: CliI 88 A9 AD 80 FC 88 4C S335F H=9:C=C-89 8858: 8C 89 4C 65 88 A2 98 BO S67BA 569 IFAS = CHRS (21) THEN 678 18 - SBADD 519 - SBC9A 8858: 26 88 90 44 B9 E8 E9 31J SF8A1l 5791 FAS =CHRS (88) AND ((H =19) OR (H =18) OR 29 - S28C7 528 - S6595 81J69: De F5 EA EA 61J AE 78 84 S6E92 (H =26) OR (H =34» THEN H=H-1:C=C-1 : 39 - S3E9A 539 - S57A2 8968: BD F6 89 80 AB 89 BD IF S4881 GOT0678 49 - SCA9A 548 - SF683 8879: 81 80 B5 89 80 48 81 80 S03A3 589 IFAS =CHRS (98) AND ((H == 99) OR (H =17) OR 59 - S8D2B 559 - S49FF 8978: C9 89 BD 7l 81 80 E7 B7 SCD4F (H=25) OR (H=33») THENH=H+ 1:C=C-19 68 - S5371 568 - S7436 81J88: BD 9A 81 SO Fl B8 80 C3 SCFE5 599 IFAS=CHRS (98) THENH=H-8: IFH<89THEN 79 - SBA15 579 - SAIlC7 8888: 81 80 FC B8 AC 8899 AD S6386 H=33: C=C+ 79 89 - S5378 589 - S9708 8999: 91 99 AE fIl2 994C 9A 89 SF789 699 IF AS =CHRS (fIl8) THEN 679 99 - SAF02 598 - S4A93 8998: 186999 fIl9 S27A8 I 14 COIIPU'I'IST #81 ...... \ Softkey for... From here on I am relying on the softkey from them impossible to type at the keyboard. Third Fred Long (COMPUTIST #53). the graphics controller file is encoded on the Matbblaster Davidson and Assoc. checks their disks disk and counts on SRA's DOS to do part of with the use of "PEEK(40324)". Where this Davidson and Assoc. the decoding. Fourth the usual control-D DOS shows up in the code we must change the code. commands are replaced by really strange Reboot and load a normal DOS, then: control-D control-various one letter entry This disk has had a few softkeys published commands. In combination with the control over the last months. None ofthese would work RENAME HI GZ IELLO, HELLO on my disk. My copy had II different address LOAD HELLO characters appended to the file names, this prologues and two different data prologues. My POU1CM,32 makes really odd disk access routines in the first attempt at disk inspection is always to make POIE33,33 BASIC programs. a COPYA version. Making the copy will be a10t L1ST4IG This job would not have been done without the Senior Prom, the Zap editor from Bag of easier if you enter these tables into Double Change the = to <> and the <> to =. DOS: Tricks and the disk utilities of Copy II Plus. POU1CM,8 With all the protection uncovered however, you Table 1 SAVE HELLO can now survive with just the Copy II Plus 00-05 0A-OF 14-05 IE-OF LOAD MI GZ lATH BLASTER utilities ifyou don't mind a lot of extra effort. 01-05 0B-OF 15-05 IF-OF LIST 368 IT] Capture the RWTS and use it to copy 02-07 0C-00 16-07 20-F5 Change the = to <>. the disk to a normally initialized DOS 3.3 or 03-07 00-00 17-07 21-F5 LIST4IG fast DOS disk. The startup program should be 04-05 0E-OF 18-DO 22-F7 called ••A". I used the Senior Prom and COPY 05-05 0F-OF 19-00 23-05 Change the = to <> and the <> to = B which is on its utility disk for this job. It takes 06-07 10-05 lA-OF 24-05 SAVE MI GZ lATH BLASTER approximately 2 minutes to get your normalized 07-07 11-05 IB-OF 25-05 copy. The disk is now COPYAble. Enjoy 08-00 12-07 lC-OO 26-05 Use Copy II Plus to "RENAME" the 09-00 13-07 10-00 27-05 Notes: CD "FILES" on the disk. Remove the control Whoever placed' ALGEBLASTER and characters from each name. This will give you Table 3 WORD ATTACK on the MOST WANTED files A, B, C, and D in BASIC; file G, which LIST, try DOUBLE DOS to softkey it. Has 00-96 0A-9E 14-96 lE-9E is the picture of the Sherlock Holmes hat; file anyone else noticed that the list is getting long? 01-97 0B-9F 15-97 IF-9F F which is the ASCII data file; and file E, which I don't understand why some of the items are 02-96 0C-9E 16-96 20-B6 looks like garbage but is the encoded graphics on the list. Certificate library volume one for 03-97 00-9F 17-97 21-B7 controller file that I'm certain has stopped instance. The softkey in COMPUTIST #43 for 04-96 0E-9E 18-9E 22-B6 deprotection of this program up until now. CERTIFICATE MAKER worked for me. The 05-97 0F-9F 19-9F 23-96 library disks can be copied with COPYA with Capture file E in decoded form. 06-96 10-96 lA-9E 24-96 U::J a few changes. Obviously the file must be decoded if it is 07-97 11-97 IB-9F 25-96 operating throughout the program. Since Copy 08-9E 12-96 lC-9E 26-96 RUNCOPYA II Plus just gave us the address (16384) and 09-9F 13-97 ID-9F 27-96 7. CALL-151 length (2559) offile E on our normalized disk, Table 6 B942:18 we simply have to stop program execution get 3A1:18 normal DOS booted and BSAVE it. 00-AO 0A-B5 14-B5 lE-B5 RUN Again the Senior Prom or the Fingerprint+ 01-AO 0B-B5 15-B5 IF-B5 printer interface makes this a cinch; but given 02-AD 0C-B5 16-B5 20-B5 The drive will grind over track 21 , but this the file's location in memory, its quite likely 03-B5 00-B5 17-B5 21-B5 is alright. If the program disk is deprotected that a IdGRESETI to normal DOS should 04-B5 0E-B5 18-B5 22-B5 then the library disks will also work. Next, my allow a clean save. I did not try that however. 05-B5 0F-B5 19-B5 23-AD Wheel of Fortune was NOT protected. I don't Why take a chance on losing code when you 06-B5 10-B5 lA-B5 24-AD think that Sharedata uses any protection on their have two of the best memory capture devices 07-B5 11-B5 IB-B5 25-AD disks. The MECC Puzzles and Posters can be ever made for the Apple. 08-B5 12-B5 lC-B5 26-AD copied by capturing their RWTS and using the Normalize the DOS commands and 09-B5 13-B5 1O-B5 27-AD SWAP controller. CD the names of files which are called by the As an example, these tables tell the read programs. Check the BASIC lines which do this routine to read track $0F with OFAA9F-05AAB5, Jim Bancroft job. They show how putting in protection must instead of 05AA96-05AMO. After the tables have drive programmers up a wall. The simple job been entered, place Super lOB 1.5 in drive 2 of opening, positioning, reading and closing a Softkey for... and run it. Then EXEC the simplest controller text file becomes a one of kind code set, useless you have (CON.STANDARD). Be sure to on any other disk. While you're altering the remove the disk from drive 2. Place a formatted Cross Clues DOS calls, eliminate the decoding offile E after blank in drive two, alter the read translate table SRA its BLOAD in programs B, C, and D. (CALL-151/ BA05:03) and copy away. You Their command set: could also try cataloging both drives. The Well I finally got into Cross Clues by SRA. Mathblaster will now catalog in drive 1 as will You just have to keep on peeling off the layers CTRL-O;CTRL-Q=RUN (usedonB, C&O) the DOS 3.3 in drive 2. The copy does not need of protection. First the disk format is in DOS CTRL-O;CTRL-B = BLOAO (used on E&G) their DOS. But for the novices it is important 3.2 with epilog modification. Second all file CTRL-O;CTRL-O = OPEN (used on F) that you know what a protected DOS looks like. names have 8 control-H's at their ends making CTRL-O;CTRL-P = POSITION (used on F)

IL--N_OV_e_mhe__r C_O_M_P_U_Tl_S_T_#6_1 ------~ ------_ '::;=--:[:T=l.-;~: _ _ _ ~:1~: __ ~~u:- ~ -~_~

------

CTRL-O;CTRL-R =READ (used on F) On their disks using FORTH as the that 4001 is actually part of the Hello in CTRL-O;CTRL-C =CLOSE (used on F) operating system, check track $(l)(l), sector $03. memory so you should not drop the line since It contains a jump to reboot make any BNE a that would relocate or lose the attached binary You will notice that before any DOS 00 e0 before the reboot (4C 0e C6) in this sector. code at the end of the Hello. Change the operation, there is a for-next loop which adds Now read track $00, sector $05 and what you CALIA001 to REM4001 and you will not CHR$(8) to the name of the fIle to call. That find is the code that Spinnaker and Designware create that problem. is how they add the control-H's to the fIle name. use all the time on their track $00, sector $3. You will ofcourse eliminate that loop since you Referring to COMPUTIST #22 page 4 So/tkey for... have nonnalized the names. It would be "deprotecting Storymaker" we find that impossible to save such names to disk from the changing byte $71 from 02 to 00 eliminates the Smart Eyes keyboard. protection. Addison Wesley In program A: make line 16 REM and On their disks using Dinky OOS changing '------normalize the command in line 2Cb the 4C e0 C6 on track $00, sector $0B to 4C 96 I Addison Wesley has Smart Eyes which In Program B: make line 10 PRINT 17 (which appeared a few bytes previous) took CHR$(4)"BLOAD E". Do not call the decode contains disk check code (86 BO 8C C0) in a fIle care of that protection. called SMART.OBJ on track $21, sector $03. routine. You will have an already decoded E In their LEARNING WELL series fIle on your disk. Eliminate the fIle name loop You must load the accumulator and set the carry modifying DOS 3.3 to ignore the first byte of flag before returning so change the code to 90 and normalize the OOS commands in lines 108 the data header (B8E6:29 (0) allowed COPYA 88 C0 38 60 and you are set. and 294. to handle this set. Then replace their DOS with In Program C: make line 3 PRINT a nonnal or fast DOS and your all set. CHR$(4)"BLOAD E":GOTO 10. In line Their Pascal is simple. Use the Zap editor Some notes on Prentice Ball 154C1) and 11400 nonnalize the fIle names and of Bag of Tricks to take block $00 from a Prentice Hall has a series ofnonnal format the DOS commands. In the routine running nonnal Pascal disk and put it onto a copy of software that gives nasty messages when you from 13028 to 13(1)4(1), REM line 13028 to kill their program made with COPYA. This same copy it and run it. A disk map shows track $05 the name change loop and alter the DOS method works for Scholastic's new ProDOS sector $03 in use but no fIle using the sector. commands in lines 13030 and 13040. protection ifyou take block $(l)(l) from a nonnal Byte $52 of the sector has disk access (BD 8C In Program D: make line 3 PRINT ProDOS disk C0) code. At byte $61 there is a 4C 66 4B, at byte CHR$(4)"BLOAD E":GOTO 10 and change $64 there is a A0 00 DO 88 C0 60, at byte $25 there the DOS command in line 32Cb2Cb Some notes on Scholastic is a BEQ (Fe xx) which lands at byte $64. A note regarding the decoding of fIle E: Decreasing the value of xx by 3 will land you File E is BLOADed by fIle B and also by Speaking ofScholastic they have released a version ofNewsroom with protection slightly at byte $61 and you will have passed the disk ftle C and ftle D. In all three programs check successfully. immediately after the BLOAD of E there is a different from Springboard's original. On track call to a location inside E which does the $00, sector $03, change byte $42 from 38 to decoding. The answer is simple take out the 18. On Track $02, sector $0Ftheiraretwo JSRs Some notes on CAl call. To make life a little more interesting most followed by BCS (2e 241FBCS xxor20 27lFBCS xx). They check the ID ofthe disk. Change them CAl (Computer Academic Ideas) has a calls within the BASIC programs are done as variety ofgame show style quiz programs. You interdependent variables (PI = P2 + 5 etc.) to EA EA EA EA EA. Elsewhere, on thedisk, you will fmd a disk check (80 8C C0) which looks for will find the usual BO 8C C0 followed by many C9 After extensive code following within E, I E7's in their protection. Finally there will be a found that only the call immediately after the some funny bytes like E9 and F7. make the first four BNE's of the sector 00 00 and you're set. BEQ (F0 xx) to some location. l.fthe code at that BLOAD will execute a decode. There is no location is 18 ge 3E change it to EA EA EA. Ifit This routine was on the disks I checked at track alternate entry methods used. It was isn't, study the code in front ofyour location. unnecessary to place any RTS within fIle E to $12, sector $03 and again at track $17, sector $0E, so you should check the entire disk. If it is a JMP then change the code at your disable the decode routine. location to the same JMP. Things should then work fine. Softkey for... Some notes on Hartley software Hartley normally copies by turning off Softkey for... Tbinkware error checking (B942: 18) and using COPYA. SRA However ifan 10 error comes up after the OOS PFS Computer Checkup prompt appears, check your Hello program for Search the disk for BO 8C ce Ie FB C9 xx 00 a call to OOS (up in the 4OOOO's), this checks el (where xx is a strange byte like E7) and replace to see if track $23 contains certain code. XPS Diagnostics is now PFS Computer the 01 with 10. Whatyoujustdidwas bypass the Remove the call and you should be set. The Checkup but the protection remains the same. check for funny sync bytes and branch to the Voyage ofthe Mimi uses this same protection. Copy with Locksmith fast back-up ignoring check for the normal data header. This set errors on track $03 and also on tracks $10-22. contains many nice Science Simulations such Softkey for... They are nibble count and unused tracks. Look as The Village Fish Farmer and The Town for 20 47 17 on the copy change it to A0 29 A9 0C Energy Planner. Megabots 60. This loads Y with 29 and A with 0C and then Spinaker (UXB) returns to the protection check call without Some notes on Mindscape checking. These values are then stored at $3A Mindscape uses several different Spinnaker (under the company name UXB) and $3B to be used later by code at $1742. The protections. Be sure to check COMPUTIST #28 has a little adventure game called Megabots. Senior Prom told me this and it didn't lie. The page 22 for some of them but here are a few Dropping the CALL 4001 in the Hello copy boots much faster without the extensive more. program eliminates the protection check. Notice and precise nibble count.

I 16 COIiPUTIST #81 NovembeI' I =- Some notes on CTW Series Garfield epilogs, it will not initialize it. Since gear. I found it convenient to have uniform Garfield epilogs are now normal epilogs, that ammo so I could trade when one person ran In COMPUTIST #28 page 23 there was a means any disk which has been previously low, so I stuck with all 9mm equipment. In any softkey for Alphabetic Keyboarding by formatted can not be reinitialized. Solution open case, you may fmd LeRoy has some useful Southwestern Publishing. Personally I didn't the drive door until it reads two 10 errors (that goodies you can now afford, but always have use that method, I used insertion ofa pretty long awful growling sound) then close the door. The a few extra inventory slots for each character. routine into normal DOS 3.3 to read the disk. IO error sets the carry flag just as if it found 4. Leaving LeRoy's you'll probably be What I noticed though, was that my modified no epilogs at all, and it initializes the confronted with''jerks'; if not, go to the alley DOS could read Alphabetic Keyboarding and "unformatted" disk. just Wand you certainly will. Kill everyone the entire Apple Presents CTW Series (an old there except the woman. Hire her. Her name set ofInteger BASIC classics). My guess is that is Christina and she comes equipped with an John E. Wanner the softkey in COMPUTIST for the armor class 5 radiation suit and Uzi. Pick up keyboarding set will take care ofthe CTW set all the goodies you find and sell them back to too. Playing Tips for... LeRoy. You can repeat this and get 2 non­ player characters (NPC) named Christina, a Some notes on Garfield Wasteland fairly powerful combination. Don't get a third In COMPUTIST #55 Jerry Stevens Electronic Arts NPCyet! softkeyed Create With Garfield Deluxe Edition 5. At this point, you may need medical perfectly. Thanks Jerry I lost my notes on that Wasteland is a fascinating role-playing attention. The cheapest place you can get this one but we did exactly the same thing to exactly adventure game which uses Uzis and Laser is the town of Highland, the closest to Ranger the same code. You figured out though what weapons instead ofthe usual swords and magic. Central. If a player is in serious (or worse) the heck we were doing. You found the As with many such games, much of the fun is condition have your best medic (or doctor ifyou translation of the IF to C0 which read the disk. found in exploring the extremely large world have one) stabilize to unconscious. Keep trying! For the life of me I had no idea where the scenario and solving its puzzles, but much of The more you use these skills, the better you working value was coming from, but I do know the frustration is in trying to obtain a set of get. If you can't cure a disease or condition, what the program did with it. Look at the code survivable characters with enough offensive and go to Highpool and pay for exam and cure, but from $6DD6 to $6DDB. It has done all kinds defensive weaponry to handle nearly anything not for healing. To heal cheaply, repeatedly of AND's and OR's then stored the value at in the game. This tip will help you get the press IESC I. (Set something on it if you've got $6E67. It then compares the final value to $5C. strongest armor and most useful weapons in a a lIe or IIc.) Make a snack, pop some popcorn, Ifcarry is set, it clears, shuts offthe drive and fairly efficient manner. get a soda. In 5 minutes or so, they should have returns. Ifcarry is clear it sets shuts offthe drive 1. First, there are four sides to the game all their hit points back. (Be sure that they're and returns. The change of 38 to 18 we made disks. Make several copies ofeach; especially atleast UNC first, however. Worse condition means no matter what ends up at $6E67 it does at least 6 copies of disk 2. The fastest way to will kill them!) the same thing. do this is to let the game disk copy one ofeach 6. Now you're ready for the big bucks. Go Jerry mentioned an unused signature on and then copy each of these sides using a fast to Quartz, just on the E side of the river and track $23. DLM also publishes a twin program copy program (like Locksmith Fast Copy.) Be S of Needles. Enter from the NE and go S. called Teddy Bearells of Fun. The protection sure to have at least 2 copies of side 1 at all There you will find a building at the N end of is exactly the same as Jerry described for times and reserve one of these. Then anytime a road. Go S. You will fmd a building on the Garfield, but this program uses every sector you want to do something foolish (like try for comer. With both Christinas in the lead, fight from track $02 on for data; so, its nibble count the "big bucks" or enter a very difficult area) your way in (if you don't encounter a door is done with track $23. They obviously format back your characters up to both. Each save only guard, it's the wrong place), get to the back hundreds of disks then put the programs onto takes 10 seconds or so. room where Felicia is held captive by Ugly. them. Garfield did not overwrite track $22, 2. Start with the 4 players you get on disk Save off. Kill Ugly and the guards and either Teddy did. Big, fat, hairy deal! until. you know what you want. Those crack the safe or disarm the bomb and blow it Finally let's give credit where credit is due. characters will survive and you can always add with the plastic explosive. There's about The Create With Garfield softkey by Robert skills as you go through the game. $1000 there. Search the SW ofthe hideout and Brown in COMPUTIST #44 has been called 3. Make your way to the village ofNeedles, find and blow the other safe, getting another many things, none of which are kind, since it in the central part of the map, just across the $500 or so. was first published. The softkey was brilliant. river. Enter from the N and you'll be near a 7. Find the courthouse (1 building Sand It accomplished with A2 00 60 what took me 36 police ammo dump. One of your stock E ofthe hideout) and blast your way in. Go to EA's. Refer to MarkHarris in COMPUTIST #55 characters can probably (save off and keep the second floor and free Danny Citrine and hire for a complete list ofthe sectors you will need trying) disarm the booby traps. (Stay away from him. Go to the 3rd floor and open the SE cell to work in if you don't want to search. Search the old TNT!!) Get more ammo and explosives. (pick or TNT) where Danny will get you for 80 9E 88. This codestores the epilog byte into Go to the police station, pass the desk sergeant $1000 more. (The BED!!) DOS as Garfield changes from Program disk and go to the first room on the right. Have a 8. Disband Danny permanently, save off to Data disk. Naturally since your program is character with the appropriate skills (keep and repeat 6 & 7 until you have $25000 or now the same as the data disk, you don't want trying!) pick the lock, search the right wall for so. In so doing, you will fight other bad guys, to do that anymore. You still have to tell the the alarm and set it to 0. Raid the now disarmed get more ammo, money and even an occasional program that you did it though. So, 3 bytes in armory. Do notmess with the cells in the jail! sub-machine gun or so and earn experience, front of the 80 9E 88 put A2 00 60 to load the X­ This is fatal! too. As your characters gain experience, add register with 00 and return to the caller. 4. Head S to town. You'll have some spare only IQ points for a while. Enter the libraries You are going to have one minor problem weapons and equipment (I found grenades were (there's one near the police ammo dump, for with your normalized copy. When it is time to next to useless) and find LeRoy's (2nd building instance) and add skills. Absolutely necessary initialize, if the disk you want to initialize has East of the edge of town) and sell your extra in the long haul will be assault rifle, doctor and

I Novembel' COMPUTIST #61 17 I energy weapon skills. Make sure all your purchased the IIgs version of Springboard's the same way. In a normal boot, the computer characters (even NPCs) have them. You should Certificate Maker. This is a slightly different reads DOS from the first three tracks and then also have a couple of players with anti-tank version of the program than that which was moves the head way over to track $11. weapon capabilities. Finally, when these are initially introduced about 2 years ago for the Obviously the programmers were not using developed, add strength points to one character lIe. Although the original version would boot DOS. until they're at least at 20. and allow one to create a certificate on the IIgs, Next I tried to copy the disk. It copied 9. Now, go back and get another Christina it failed as soon as you tried to print your correctly, indicating that Fraetalus probably had (unless you've got another strong NPC creation. The new version recognizes the a normal RWTS. This also meant that I could already.) Pool all your $ to one, disband (Non­ capability of printing from the printer port of easily sector edit it. However, there was a read permanendy) your Christinas and go NE to the IIgs. error on track $00 sector $0B. At first I was Darwin. The fastest way to enter is from the Unfortunately, when Springboard modified afraid that my original was already going bad, SW, but make sure you have radiation suits! the program to work on the IIgs they also but as it turned out this bad sector was a beacon The building in the SW comer is the black apparently changed the copy protection scheme. signaling the method of protection. Since the market. Blast your way in, sell offeverything At least it appears that way, since neither the protection was on track $00, boot code tracing but the canteens and radiation suits and buy 4 softkey in COMPUTIST #39, page 6 nor that sounded viable. more radiation suits, 7 NATO rifles, at least in COMPUTIST #43, page 24 works on the Examination of track $00, sector $00 28 clips of ammo and as many Sabot rockets new version. In fact, track $22 is now easily showed that it was completely normal for a as you can affoid. You'll also need some TNT readable (this was the track that previously slave disk. This meant that RWTS would be or plastic explosive ifyou don't have any. Go caused problems in making a routine copy) but loaded from sectors $00 through $09 into back and distribute the goodies. You're now track $20 cannot be read by a sector editor. memory from $B600 through $BFFF, and execution of RWTS would begin at $B700. ready for the REALLY good stuff. ~ Perhaps there is an easy fix to the The RWTS, on the other hand, had 10. Enter the Citadel. (This is in the previous softkeys that will work on the new IIgs mountains to the NW ofRanger Central and N version. Not being expert in this area, I would obviously been modified. The first line, at of the Agricultural station.) Save offto both appreciate if someone could take the time to $B700, had been changed from "STX $B7E9" to "JSR $BB00". $BB00-$BC55 is RWTS's disks! Get as close as possible, then blast figure one out and offer me a solution. buffer, where sectors are moved during disk anything that moves. Have your AT weapon Certificate Maker is a very popular program access, so it is usually filled with garbage. In characters alternate shots with Sabot rockets, and no doubt many other readers with IIgs's will Fractalus it contains the protection code. The LAW rockets or RPG-7s ifyou have any. Keep be interested in such a softkey. blasting. You may have to leave and heal your actual protection code resides at characters occasionally, but the Citadel $BB34-$BBCB. characters you kill stay dead, so it eventually Silicon Sorcerer First the routine uses the normal "Read gets easier. Address" subroutine to find physical sector $08, which is logical sector $0B. On fmding In the Citadel, you'll fmd all kinds of Softkey for... the sector, it locates the address header and energy weapons and power packs. In the NW begins reading bytes lj,t $BB63. Below is a section ofthe second chamber, there is a library Rescue on Fracta1us partial listing: where you can get energy weapon capability if Epyx / Lucasfilm you don't already have it. As soon as possible, BB63- BO SC C0 LOA $C9SC,X equip and start using them. Fight your way BB66- Hl FB BPL $BB63 • Requirements straight to the back of the hall near the steps BB6S- BO SC C0 LOA $C9SC,X and portcullis. Enter the door at the left ofthe o Apple II computer BB6B- 39 FB BMI $BB6S steps, fight your way to the control wheel and o Original disk BB60- BO SC C0 LOA $C9SC,X get your strongest character to use strength on o Blank disk BB79- 19 FB BPL $BB60 it. Enter the steps and open the safe to the E. o Copy program that ignores errors BB72- BO SC C9 STA $C9S0,X The combination is "rosebud". This will give o Beneath Apple ProDOS (optional) ; BB75- 19 FB NOP you more power packs and more importantly BB76- BO SC C0 LOA $C9SC,X 5 suits ofpower armor, AC 14. Ofcourse, you In Rescue on Fractalus, the player must fly BB79- 39 FB BMI $BB76 can repeat this with as many disks as you need a jet through alien terrain searching for downed BB7B- BO SC C9 LOA $C9SC,X to equip all your troops. Ifyou always sell your pilots. The ship is fitted with antimatter cannons BB7E- 19 FB BPL $BB7B extra goodies to LeRoy on the same disk, you and shields, and the enemy consists of BBS9- BO SC C9 LOA $C9SC,X can then buy extra power packs, weapons or mountain-top gun emplacements and flying BBS3- 39 FB BMI $88S9 armor ifyou run out or accidentally lose them. saucers. The most striking feature of this BBS5- BO SC C9 LOA $C9SC,X With these goodies, you will be able to program is the terrain. As suggested by the title, BBSS- 19 FB BPL $BBS5 withstand most any ofthe nasties you encounter it is made up of 3-D fractal mountains. in Wasteland and be able to concentrate on Naturally it is protected, and the protection is There were a few things in this code that exploration of the world and its puzzles. extremely difficult to bit-eopy. Bit-eopies looked strange to me. The first, a minor one, usually died at track $00. was that the branches were alternately BPL and BMI. A BPL in this situation indicates invalid Arthur Simon data, and why would they want to read that? The Protection In the past, I recalled seeing only BMI's. The I have been a subscriber to your magazine As usual, the first thing I did was watch answer, ofcourse, is to make sure the program for several years now and have found it to be and listen to the boot sequence. On booting, the didn't read the same byte off the disk twice, of immeasurable value for backing up my disk seems to load all or most of tracks $00 before the hardware could begin reading the valuable software. I recently switched from an through $07 in order, give the title screens and next one. An interesting side-effect is that it also Apple lIe to an Apple IIgs and, in doing so, music, and then loaded tracks $08 through $12 disables Locksmith's Automatic Boot-Tracer.

I 18 COIIPDnST #61 Nove...... I The second thing that was strange was the bytes, it goes through a mess of adds, POD 47.,24 bytes the program was apparently reading in eXclusive-ORs, and logical "and"s in an anCOnA while it was running. I would boot-code trace attempt to confuse any would-be krackist. It a bit further and look at the bytes it would read then stores the results at $3F0 and $3Fl and a::J Make the following sector edits to the and store. When I tried to find them on the disk, zeroes locations $70 and $71. This is to keep copy you just made. they were completely different. For example, us from simply bypassing the protection routine. Trk Set Byte(s) From To where the program read "EB B6 EF 9A ...", I I found the needed results easily by boot­ would find "FO EO BB E6 ...". tracing. $3F0 and $3Fl should be 07 and F9. $99 $9E $4A-4B 00 F4 EA EA The third thing that puzzled me was the Incidently, it is possible to boot-trace on a IIc, $53-54 00 46 EA EA STA $C08D,X. This location is usually only but it is a little more tricky, as critical bytes $5C-50 00 3D EA EA accessed during writing or sensing whether or can change mysteriously. $6F-79 00 F4 EA EA not a disk is write-protected. Actually, I didn't To softkey Fractalus, I simply overwrote $7l-7E A0 97 BO 8C C9 EAEA A9 FC 85 figure it out until after I had kracked it. The part ofthe protection code with code to change 19 FB 01 F6 DB F9 85 F3 A9 EE thing that helped me get it was Beneath Apple the 4 above locations and continue. Below is IF 88 10 F4 85 Fl 85 F2 ProDOS, by the authors of Beneath Apple a disassembly: DOS. In the back ofthe book there is a section on the "state-sequence ROM". H $C08E,X BB34:LOA #$07 Softkey for... and $C08D,X are accessed, as they are here, STA $03F0 LOA #$F9 the ROM goes to sequence #0 and stays there STA $03Fl Gauntlet until the state is changed, as it is in this case Mindscape by the command LDA $C08C,X. This JMP $BBC5 command comes 6 machine cycles later. So the Address $BB34 is on disk at track $00, Gauntlet is deprotected by a scheme effect this routine has is to extend the time used sector $05, byte $34. identical to The Twit's "Infiltrator" Softkey to read the byte by 6 cycles, or about 1.5 disk­ on page 8 of COMPUTIST #56. bits (each disk-bit takes about 4 cycles to be read Step by Step in). [I] Boot your DOS 3.3 system disk. To understand the significance ofthis, we [I] Copy with any whole-disk copier that c:rJ Tell DOS to ignore checksum and will have to examine the disk-bits on a binary can ignore errors. Copy II Plus's "copy disk" epilog errors and use COPYA to copy the disk. level. Below are the bits immediately following option is fme. Don't use an unmodified POlE 4-7.,24 the Address Header (D5 AA AD) of sector COpyA, as it will die on pseudo-sector $0B anCOnA $0B: of track $00. 11111111101011111010111110011110111 ... D::J Make the following sector edits to the Normally, the bits are divided into groups c:rJ Make the following sector edit to the copy you just made. of 8 by the hardware as follows: copy: Trk Set Byte(s) From To 11111111 18101111 10101111 10011110 Ill... Trk Set Byte(s) From To Most nibble-editors display this bit stream $99 $93 $42 38 18 in hexadecimal: $09 $05 $34-$49 A9 10 85 FF C6 A9 07 80 F0 93 $98 $EA-EC 29 99 92 EA EA EA FF CF CF 9E FF 00 93 4C C6 A9 F9 80 Fl 93 This is what you see when you read the disk B6 20 44 4C C5 BB normally with a nibble-editor. Remember, Softkey for... though, that Fractalus adds 6 cycles to the third a::J (Optional) Change skewing to byte, giving us: 4-descending. This will greatly reduce Cola Courseware 11111111 10101111 101011111 00 11110111 ... loading-time. Emtech The two zeros are dropped because all disk­ bytes must begin with a "I". The hardware Charles Taylor • Requirements treats the third byte as a sync-byte. This gives us, in hexadecimal: o SREADISWRITE (from COMPUTIST #24) FF CF xx F7 Softluy for... o Fast copy program The third byte is uncertain, since shifting o 10 blank disk sides states in the middle of a read tends to destroy Deatbsword I o Method of copying DOS to disk (optional) the read byte. Epyx Cofa Courseware is a series of 5 double­ Notice that normally there are 3 binaty ones """----- sided math disks aimed at senior high school left over, which become part ofthe fifth byte. • Requirements In the Fractalus read, these bits have been used students. The disks all are normal format up. This will change the next group of bytes o COPYA (COpyA-able), but the copies don't run. At completely, just as it changed the fourth byte o Sector Editor first the simple protection on these disks had here! Normally they would be "FO ED BB o 128K Apple me stumped, since the scheme hasn't been used E6 ...",butnow they are "EBB6 EF9A ...", which in a number ofyears. Many thanks to Bluebeard is what Fractalus looks for! In short, this is a Deathsword can be cracked using an for reacquainting me with this protection way to hide protection information from adaptation of Mr. Nissel's "Arctic Antics" scheme. hackers' prying eyes. In addition, bit copiers procedure on page 25 of COMPUTIST #56. The reason the COPYA copies don't work is that the catalog track has been moved from have trouble reading the "sync bytes" IT] Boot your DOS 3.3 system disk. perfectly, so bit copies usually fail. its normal track $11 to $23. COPYA only Now, after Fractalus reads in the next $10 c:rJ Tell DOS to ignore checksum and copies through $22. The deprotection is simple epilog errors and use COpyA to copy the disk. also. It involves moving the catalog back to

COMPUTIST #81 19 I _~.~_ ::r_"":. ":". _."":.....: • . .:"-~=:~-:-:- .:_;--:------track $11, sector editing all of the track $11 DOS, rather than using the sector editor so that procedure for ProDOS v1.1-v1.4 (v1.0 sectors so that byte $01 is 11 insteadof23, then I could look at the actual memory locations.) addresses are in italics): copying a new DOS from the system master to I made my non-working copy into a working the copy. copy by changing the $93B7 to $9400. CALL-151 I used SREAD/SWRITE to read in track c-.c-. CD Copy Mathbusters with a fast copy D314:1868 (FBE4) $23 from the original and write back to track program. $11 of copy, sector by sector. This laborious D4CC:18 (FCCC) process might be OK for one side, but ten sides? [IJ Sector edit CIBA I then wrote a BASIC program to normalize the Trk Set Byte(s) From To Now execute your file copier and copy a catalog track, including the correction of the normal version of PROooS onto the blank catalog track numbers. (POKE D,17) $IE $08 $05-06 B7 93 0094 disk. Then copy all the fJ.les except PRODOS CD Copy all ten sides with a fast copy from the MECC disk onto the blank disk. OPTIONAL method program. [IJ All that remains to be done is to stop the SLOAD BOOTIR.OBJ routine in MECC.SYSTEM that executes the [IJ Type in the BASIC program and CALL·151 ProooS quit command ifits device driver isn't SAVB COFACOPY on a disk containing 92D1:" 94 present: SREAD/SWRITE. Be aware of the typo in BSAVI IOOTER.OBl, A$92DI, L$ZBI COMPUTIST #24. The line "BSAVE BLOAD IIICC.SYSTDI•.A$2IH,TSYS SREAD/SWRITE,A$300,L$3A4" should CALL·151 read "BSAVB SREAD/SWRITE, A$300, 938:18 was 38 L$A4" Bill Jetzer BSAVIIOCC.SYS1'DI,A$2....TSYS CI:J Run COFACOPY. COFACOPY will prompt you to insert the originals and copies. I would like to comment about your back Softkey for... Be sure to write protect the originals. issue section. How about different sections for 5 t.4" disks, 3th" disks, and IIgs software? It C!J Copy a normal DOS to the copies. would make things less confusing, and if Catalyst 3.0 I Lacking a method to copy DOS, copy all fJ.les someone orders a back issue for a particular Quark Inc. to an initialized disk. piece of software, he can be sure that he won't 1------1 get a softkey for the wrong type of disk or • Requirements Softkey for... computer. D 3th" disk copier Matbbusters i That's a good idea but it would be almost D 1 blank 3th" disk Spinnaker impossible to do. Many readers do not send the I know there have been other softkeys for requirements list with their softkeys. Andthey often this program in the past, but I don't know if • Requirements do not mention what kind ofmedia the program they were for the 5 t.4" disk or the 3th" disk. is on. Unless it's part ofthe name, sometimes we Mine is for the 3th" disk. D copy program can't even tell which computer the softkey is for. Blocks $08-$17 are stored on the disk in D sector editor (optional) So, if we separated the ones that we know into such a way that ProDOS can't read them, but different sections, you would still have to search they contain code that is necessary for the Mathbusters can be copied with COPYA, the main body oftext for the ones that fell thru program to run. It is the job of but the copy won't run until the protection is the cracks. Your best bet is to send us a letter CATSTART.SYSTEM to read these blocks defeated. Here's how I found the copy requestingmore info on the particular software that into memory. Once in memory, a routine is protection: you are interested in RDfXed executed that checks for the abnormal blocks. A catalog of the disk shows several To deprotect Catalyst 3.0, follow these programs with either lIe or IIc in the title. I Softkey for... steps: reasoned that the first useful function of the Copy the disk, ignoring the errors on program is to determine whether it was running CD Presenter blocks $08-$17. on a lIe or IIc. A program can do this by MECC checking the bytes at $FBB3 and $FBC0 and [IJ Get into BASIC by executing BASIC.SYSTEM. comparing with the following table: • Requirements [r:J By loading in CATSTART.SYSTEM FBB3 FBC0 Type DI blank ProDOS disk at its relocated address, you can execute the 06 00 lie D a fJ.le copier code that reads the abnormal blocks: 06 EA lie MECC software has never had very intense SLOAD CATSTART.SYSTIII,A$CH.TSYS 06 E0 enhanced lie protection, and the Presenter is no exception. <>06 Ilorll+ It changes the epilogue bytes from DE AA to FF [J=:J Before executing the code, put a A sector editor found the $FBB3 and AA and quits to ProDOS if its altered device BReaK instruction right after the code that reads $FBC0 references on track $lE, sector $07. driver is not present in memory. the abnormal blocks: A catalog ofthe disk showed this sector to be To deprotect the Presenter, boot a ProooS CALL·151 part of BOOTER.OBJ, which loads in at disk and get into BASIC. Next, tell the device $92D0 and is $2BE in length. The first driver in ProDOS to ignore read errors. This 047:" instruction in BOOTER.OID is a JMP to is similar to a POKE 47426,24 in DOS 3.3 []:=J Execute the code: $93B7. The FBB3 was located at $9402. (At except that it only ignores checksums and this point I had bloaded BOOTER.OBJ from epilogues, not all read errors. Here is the C5fG

I 20 COMPUTIST #61 November I I. Trying to run SlOB without a controller. [J::J Once you hear the beep and see the Softkey for... registers, all the code has been read in. The SlOB on your Starter Kit disk is bare. You must Actually, CATSTART.SYSTEM has no other Tink's Subtraction Fair LOAD SlOB, then EXEC a controller into it, then purpose than loading those blocks, and it won't Mindscape RUN it. Use CAPTURE on the Starter Kit disk to be used anymore. Instead, you can make a convert an Applesoft controller into an EXECutable file. system file out of the code that was just read [TI Boot your DOS 3.3 system disk. in. First, clear some memory: 1. Trying to run a controller without SlOB. [IJ Tell DOS to ignore checksum and The controller is the heart ofthe SlOB program. 2,":' N 2"1<2.'.2'FEM epilog errors and use COPYA to copy both The SlOB program is a shellofuseful routines. The sides of the disk. controller calls (GOSUBs) these routines in the CD Now enter the relocator that will move proper order to copy a disk. The controller is not the code to its proper address: POKE 4742&,24 a stand·alone program. RUN COPYA _':A2 " BD ..4. 90 • SF 3. LOADing SlOB then LOADing a controller. 2_:18 D8 " CE 84 Z' CE .7 CD Make the following sector edits to the By LOADing the controller, you dumped SlOB and 281.:2. AD '7 2' C9 3F De EA copy you just made. only the controller is left in memory. (See #1) You 2.18:4C'.4. must EXEC a controller after you have LOADed Trk Set Byte(s) From To SlOB, then type "RUN" and press /1lE'J'UIWJ. IT] Move the disk code to its new location $00 $05 $5F-61 20 44 B9 EAEA 60 4. Variations on #3 result in # I and #1. IE. so that it can be saved: LOADing the controller then LOADing SlOB, LOADing SlOB and RUNning the controller, etc. 21.<48M.5I'iTM Softkey for... 5. Trying to use the swap controller without You may have noticed a file named first saving the RWTS. The swap controller uses ITJ the RWTS from a protected DOS to read a CATALYST.3.0 in the catalog. This file is G.LJoe protected disk. You must first capture and BSA VE located on blocks $08-$17 and kept these Epyx blocks from being allocated to files that were the RWTS from that protected disk. later saved to the disk. This is an ideal place I'm sure we can find out why SlOB isn't [TI Boot your DOS 3.3 system disk. to save the code: working for you. Why don't you give it another IT] Tell DOS to ignore checksum and shot? RDEXed UNLOCK CATALYSU.' epilog errors and use COPYA to copy the disk. SSAVE CATALYSU.',A$2'.,L$21H,TSYS POKE 4742&,24 Jack Nissel []!] Lastly, give CATALYST.3.0 a new RUN COPYA name so that PRODOS will be able to find and Softkey for... execute it: [I] Make the following sector edits to the copy you just made. RENAME CATALYST.3.',CATALYST.SYSTEM on side 1: Tower of Myraglen ~ I don't know much about 31h " Trk Set Byte(s) From To PBI Software disks, and I want to know how Catalyst could $00 $01 $00-1F A9 0A 85 F4 A6 A9 FC 85 F0 A9 • Requirements make the device driver read blocks $08-$17 2B BD 89 .. . EE 85 Fl A9 EE when ProDOS couldn't. If anybody knows 85 F2 A9 FC 85 o 2 blank 3.5 disks where I could find a book explaining 3 1/2 " disk F3 A9 E7 85 F4 o Any fast copy program that can ignore errors formatting and the usage of its device drivers A9 EE 85 F5 A9 o A sector editor or ifyou could explain it yourself, I would like FC 85 F6 A9 E7 to hear from you. I would also like to read more 85 F7 about 3V2" diskette protection schemes and [IJ Copy the original disks to your blank $20-79 aII EAs disks and ignore a read error if one is about using the drive independent ofthe device driver. You may write to me at; Route 1, encountered. Plymouth, WI 53073. ~ While I have had much success IT] Make this sector edit to disk I. backing up my disks using sector edits and modifying disks slightly, your lOB program Bloek Byte(s) From To MJ Howard really puts me off. I have never been able to $40F $72-75 22 CB IB 00 EAEAEAEA get the hang ofit and receive a variety oferror messages whenever trying to use it. Whether Here are a few cracks that have worked for installing a standard controller or typing in a CD Write the sector back to the disk. me on G.!. Joe by Epyx and Tink's Subtraction new one from the magazine, it never works. Fair by Mindscape. Not exactly hot stuff, but Is it just me? Softkey for... bit copies of them would not work, therefore the protection on them had to be removed. i Most ofour readers don't have any problem Cannonball Blitz Using past issues ofComputist (a valuable using Super lOB (SlOB). You don't say what Sierra On-Line reference) I found sector edits ofprograms from computer you are using or exactly what you were Epyx and Mindscape that would work on my doing when you got the error messages, nor what • Requirements disks, but on different sectors. the error messages were, so I can't tell what's I determined which sectors to be edited by wrong. However, here are some ofthe problems o 1 blank disk scanning the disks for the indicated byte most often encountered the first time a reader tries o A sector editor sequence to be changed. the SlOB program: o COPYA (from DOS 3.3 system master disk

[ November COMPUTIST #61 21 I deprotection. Mr. Hart's article was a good CLJ Boot your DOS 3.3 system disk. To ignore Address Epilog general discription of the protection schemes L!=:J Tell DOS to ignore checksum and used on Apple software. He mentioned in his DE - $B993:00 POKE 47507,0 epilog errors and use COPYA to copy the disk. article a table of changes to DOS for reading AA - $B990:00 POKE 47517 ,0 POll 47426,24 altered address and data marks in an earlier To ignore both: RUN COPYA issue. Since I do not own any reference material $B988: 1860 on DOS 3.3 I had to dissasemble it to find out POKE 47496,24 POKE 47497,96 D:::J Make the following sector edits to the what makes it tick. For the readers who, like copy you just made. I, do not have that issue, I have compiled a list To ignore Data Prolog of changes to read altered formats. I will also Trk Set Byte(s) From To D5 - $B8E6:29 00 POKE 47334,41 POKE 47335,0 include some important DOS locations that I AA - $B8F3:00 POKE 47347,0 $17 $0E $CO 60 find helpful when deprotecting 3.3 software and AD - $B8FE: 00 POKE 47358,0 some poi.nters on the ProDOS MLI (machine IT] Write the sector back to the disk. language interface). To ignore Data Epilog Softkey for... Important Locations $B925: 1860 POKE 47397,24 POKE 47398,96 PFSFILE $3EA Reconnect DOS input/output hooks. $AC01 Catalog track # To ignore RWTS errors $A884-A907 DOS command locations PFSGRAPH JMP to $FAA6 Sneaky way to cause the disk to $BE48: 18 POKE 48712,24 PFSREPORT reboot $AA60-AA61 Length ofthe last bloaded file (low Software Publishing Corp. To ignore Checksum and Epilog byte/high byte) $AA72-AA73 Address ofthe last binary file (low $B942: 18 POKE 47426,24 The following softkey is from byte/high byte) Compuserve's Apple MAUG. This information $A964: FF Allow a large BSAVE. On a single is only for the purpose ofcombining these three To ignore Data Checksum load program you can BSAVE the popular programs to one 3'h" disk or for program to a normal DOS disK. $B920:EAEA POKE 47392,234 POKE 47393,234 making 3'h" copies that will boot on the IIgs. All three programs are de-protected RWTS calls identically. Make these changes to copies ofthe ProOOS files, NOT the originals! Six bytes need to be $3E3 Return the address of the lOB (input changed in the .SYSTEM file. Make the output block). Before a call to the RWTS A good percentage of software I've changes from BASIC. a JSR to 3E3 returns the adress ofthe lOB deprotected that uses ProDOS 8 or ProOOS 16 looks for a bad block or has an altered disk BLOAD IpI6lFILE.SYSTEII, 'l'SYS, A$1... (Y reg lo-byte, A reg hi-byte). format. A ProDOS block is the equivalent of CALL ·151 $B7E8-B7F8 The normal lOB location 12D7:A9 $309 The actual call to the RWTS is done by a two DOS 3.3 sectors and at the disk level there 12D1:A9 JSR to 3D9 (20 D9 (3) . Any track or is no difference betweenProOOS or 3.3. Since it is beyond the scope of this article to cover 12I8:1A1A sector can be accessed thru this call, either ProDOS version in detail, I will include 1ZI8:1A IA including a check on track 36 ($23). the MLI (machine language interface) call most BSAVl/pI6lFILE.SYSTEII, 'l'SYS, A$1... $BA29-BAFF Read/Write translate tables. Sometimes you will notice the data on the often used in protection methods. Keep in mind Repeat the above for GRAPH.SYSTEM disk looks garbaged , no readable code. when scanning a disk for a direct read (LDA and REPORT.SYSTEM. Write protect the Check the Write translate table C08C,X OR LDA C0EC), that other methods copy. (BA29.BAFF) and the Read tranlate table are available in a ProDOS environment. (BA96.BAFF) on a normal DOS ~nd Gary Verbuch compare them to your protected disk. One ProOOS 8 byte changed will garbage the data and make it unreadable by a normal DOS. The ProDOS 8 MLI calls begin with a JSR $BF00 (which is the entry point to the MLI) I would like to thank the volunteers at read table is usually the one altered but I've COMPUTIST for responding so quickly with included both locations. and are immediately followed by three bytes. my subscription. Within two weeks after The first byte will contain the command code sending a check I received my first issue. Now ProOOS 8 ($80 for Read Block) , followed by two bytes that's service. that form a pointer to the parameter block. What I've been deprotecting software for years $B801-B93E DOS command table is contained in this block depends on the type now and I never thought ofit as a hobby, more $BEC8-BEC9 Last BLOAD length of MLI call issued. After a call is completed, Iike a necessity. I will not use an original piece $BEB9-BEBA Address oflast BLOAD the code following the three bytes is where of software until I have produced a working To allow DOS to ignore changes to execution resumes. Ifan error occured during copy. Unfortunately, with some products it can standard address and data markers use the the MLI call then the carry flag is set. In normal take some time when the disk format is following. use I will use BCS to test for an error. On a completely altered. disk checking for a bad block the code will be After reading Computist #57 it's evident To ignore Address Prolog expecting an error and often tests for the carry that readers have been complaining about the 05 - $B954:29 00 POKE 47444,41 POKE 47445,0 bit clear. Either test ofthe carry bit can be used. softkeys not containing enough information AA - $B95E:29 00 POKE 47454,41 POKE 47455,0 Here is an example of a Read Block call about the protection or the process of 96 - $B969:29 00 POKE 47465,41 POKE 47466,0 to test for a bad block.

I 22 COMPUTIST #61 November I ProDOS 8 - Read Block vessels the computer can supply you with there from D5 AA 96 to AA D5 AD for the address are options to customize your own super frigate, field and from D5 AA AD to AA D5 96 for 2999: 29 99 BF Mil entry point or you can customize the enemy to be as tough the data field. The Epilogs have been changed 2993: 89 command codt for Read Block or as weak as you want them. from DE AA to AA AA and D5 AA for the 2994: 1111 address ofparm block, dtfintd by user address and data fields respectively. (lo-byte/hi-bytt order) Softluy for... 2996: 9911 branch on carry clear to crash .JJlock was C[] !NIT a blank disk with a fast DOS (I read and an error did /Wt occur used ProntoDOS). ???1: 93 parm block -1st byte will be 03 Broadsides v2.0 !NIT AZTEC 1111: 11 2nd byte will contain device II drive # Strategic Simulations Inc. 1111: 1111 3rd and 4th byte will contain the pointers a:::J Enter the controller below into Super to the dJJJa buffer (lo-byte/hi-bytt order) The trouble is SSI has protected this game lOB 1.5 and run it answering no when prompted 1111: ?? 11 byte H 6will contain the logical block # in such a way that Locksmith 5.0, EDD 4.7, to format. to read (lo-byte/hi.JJyte order) and Copy II Plus 8.2 will not give a working backup even with extensive parameters. I Controller ProDOS 16 naturally turned to COMPUTIST back issues When a system block call is used in this for help. There seemed to be no listing for it 1999 REM AZTEC CONTROLLER environment there are a few minor differences in previous issues, but several SSI games were 1919TK=3:LT=31:CD=WR:MB=151 because ofthe memory capacity ofthe IIgs. The documented. Study ofthese previous techniques 1915 POKE 47426,24 format ofan MLI call is the same but the entry led to this softkey. 1929 ST =0:T1 =TK: GOSUB 490: RESTORE: GOSUB point is in bank $El. The pointer to the Remember previous issues that cover the 190: GOSUB210 parameter block and the definitions within the same company are a great starting point for 1030 GOSUB 430: GOSUB 100: ST =ST +1: IF ST <16 block have to accommodate the increased protected programs that are not listed. THEN 11139 memory range .I will include an example 1040 IF BF THEN 1060 similar to the ProDOS 8 version. The Protection 1050 ST =,,: TK =TK +1: IF TK

24 COMPUTIST #61 November I 1 • Requirements is used to read the fifth page of data into Controller memory at $800. Install a break point and read o Super lOB 1.5 in the last page: 1999 REM ONE ON ONE (NEW VERSION) o Sector editor 1 blank disk side for the Master Module 1919 TK =9: ST =9: LT = 35 :CD =I'IR o 1".:"11HG I blank disk side for each other Module 1929 T1 =TK: GOSUB 499: IF TK >3THEN RESTORE o ~D mm~~~~~ : GOSUB 219 A teacher at my school recently asked me Move the fifth page ofdata to the end 1939GOSUB439: GOSUB 199: ST =ST t 1: IFST

I November COMPunST #61 26 I are the same edits performed on the extra problems with the device then I would like to modules disks: know about them now. My main concerns are compatibility with available software and Trk Set Byte(s) From To Search command for Apple Irs system hardware, and the actual speed $99 $96 $65-66 EA BD 18 69 This routine will work for any Apple II improvements $98 $98 $65-66 EA BD 1869 except the enhanced lle or llgs. They already Installation of the Zip Chip consists of $9C $99 $38-39 EA BD 1860 have their own search routine. removing the 65C02 and replacing it with the $94-95 EA BD 1860 As you mayor may not know, the enhanced new processor. A chip removal tool is included' lle contains a nifty search command in its to avoid any damage in the process. All done. Put your originals in a safe place $F800 ROM. Even if you don't have an For the readers who are not interested in (so the students don't play frisbee with them). enhanced lle, you can take advantage of this the technology behind the Zip Chip, my Ifyou have several computers in your lab, you 26 byte, fully relocatable routine. comments and final conclusions are at the end' can COPYA as many as you like. of this article. Search Syntax Zip Technology has developed a 65C02 Controller processor to run at 4 megahertz with a 16K Search is called with a monitor command cache memory, whereas the processor.in youri 1090 REM SCIENCE TOOLKIT of the form HHLL

I 28 COIIPUTIST #81 November I ,.

banks are refered to as fast RAM, where Enough about caching and softswitches, exists only once within the database. Similar interaction between the processor and these two lets continue on to software compatibility. I tests were run on a spreadsheet containing 181 banks can be up to four times the access time have quite a large collection of software with names with 28 fields per name. of the RAM external to the microprocessor. just about every type of program imaginable. The last entry in the table is the results of Remember, the 16K bank is contained on the The easiest approach to ensuring compatibility a Ik Applesoft program that calculates and Zip Chip and is not part of Apple's main is to simply run the software. After booting up displays the hex and binary digits ofthe decimal memory. This RAM is available to the and running approximately 50 different numbers from 0 to 255. processor only and cannot be accessed thru products, I'm convinced that Zip Technology software. During program execution, the Zip left no stones unturned. Quite a few of the Time Comparison Tables (in seconds) Chip polls the tag cache to determine whether programs I ran utilize auxiliary memory and the data required is in the data cache. Here is every graphic mode available on the Apple has I Ie lie +ZjP IIgs what is referred to as a cache hit or miss. If been accessed. Every program ran without Data Base (l29K) the data is not present the processor has to slow incident. There appears to be no problems with me down to normal speed to read main memory and hardware compatibility either. Alpha sort (A-Z) HI 3.2 3.3 is referred to as a cache miss. A cache hit is Since some software for the Apple takes (Z-A) 10 3.2 3.3 when all· the necessary data is contained in the forever to boot, I'll include a time comparison Number sort (0-9) 14.5 4.2 4.8 data cache and main memory is not referenced. table for a few popular programs. Before I (9-0) 13.6 4.1 4.8 The·.amount of cache hits and misses witl continue, the Zip Chip can destroy a disk ifyou Text search 49.9 14.6 18.9 determine the actual run time of a program. try to configure slot 6 faster than normal. OOS Although the actual size ofthe Zip Chips cache uses time critical code that can't be tampered Spreadsheet me 56K is only 16K, it can take advantage of the fact with. In most cases, there will still be some Alpha sort (A-Z) 9.5 3.0 3.3 that regardless of the type or length of a increases in the boot process or disk access. (Z-A) 10 3.2 3.2 program, there will always be certain portions Remember, even during a boot, there is code Text search 6.4 2.0 2.1 ofcode which is executed more than others. A executing in memory. program that can be contained in the data cache Number Conversion program IlewlZip Chip Standard lie will run at full speed because the Zip Chip never 151 66 70 has to slow down to reference main memory. AppI eworks 17 seconds 18 seconds A common question at this point is why Wor Id Ganes 18.2 seconds 28 seconds don't they just clock the whole system at 4 Ca Ii forn iaGanes 17.2 seconds 29.2 seconds Comments megahertz and utilize main memory. As you can se.e from the above We did run quite a few othertests, but since Unfortunately, the Apple was not designed to the results stayed consistent with the above table be clocked that fast and would have to be comparisons, disk access is very unpredictable. If your main concern is to speed up disk I/O we chose not to include all of them. The Zip redesigned. Chip consistently ran 2 to 3.5 times faster than There are six softswitch registers available then the Zip Chip is probably not for you. There are disk caching products on the market that a standard lle. Speed improvements over the to the programmer to control certain aspects of llgs were minimal in all tests. the Zip Chip. I will include a general address that issue. Well, so far the Zip Chip is everything Zip I originally set aside one piece ofpaper to description ofeach switch rather than describe record any annoyances or problems that occured every bit pattern's effect. Technology claims. Although hardware and software compatibility are important, speed during testing. After two weeks there are only Address Function improvement is the reason for purchasing the two entries on my problem sheet, and both entries are very minor annoyance.r;rs.===", $C95A Lock or unlock the Zip Chip. Protect processor. 1). During a warm boot (ldslII8ITl) configuration changes. At this point it was time to decide what you must hold the open apple key down for A writeenables the chip& a read returns method to use to test the Zip Chip's speed. The $C95B approximately two seconds before the boot is the current RAM size. Fast or sync mode, most common benchmarks utilize a couple of actually initialized. fast or normal paddle mode and control mathematical approaches, such as the Sieve of 2). When deprotecting software it is often over cache updating. Eratosthenes or the Fibonacci benchmark. I've ~ to reset out ofthe program. Hitting Control speedofslots (fast/normal) decided to use Appleworks for two reasons, $C95C 1-7 ~ in rapid succession is as effective as lIJl(l speaker toggle (fast/normal). first, I feel the results of one iteration of the tapping these keys once. $C95D .. Control over cache speed. (1.1111 Mhz Sieve or calculating the 24th Fibonacci number to 4.([)([)00 Mhz) 100 times would be abstract to some readers Conclusion $CQSE Read Apple softswitches (control and second, Appleworks is probably the most synchronous sequences).A1so used to popular application and the results would be of If you want to increase the speed of your ensure your code will execute atthe system more interest. Apple lle or llc considerably without spending speed selected. Pierre and I decided to test the Zip Chip the money for an Accelerater card then I highly $C05F Control the caching of language card with a simple Appleworks sort and search. reccommend the Zip Chip. I could not find one memory or bank switched memory cards. Since a standard Apple lle contains only 128K notable flaw with the processor and every of ram we used an Applied Enginering Ram program tested ran considerably faster than The Zip Chip comes with a disk containing card for testing. The Zip Chip is capable of normal. diagnostic and configuration software. The caching up to 2 megabytes ofauxillary memory. Installation ofthe device is simple and can configuration program included allows you to The database file used contains 1547 be completed in a matter of minutes. Zip alter the above switches without writing any records consisting of30 fields. Each field used Technology offers a 30 day money back code. Ifat any time you would prefer the Apple for the alphabetic sort contained on an average guarantee ifnot completely satisfied within that to run at normal speed, pressing ESC of 15 characters and the numerical sort used a time period. immediately after a cold or warm start will set field with 5 digits. The text search scanned For the price of$130.00 you will possess the Zip Chip to run at 1 megahertz. every record for the occurence ofa name which an Apple with a brand new personality. I November COIiPUTIST 181 271 of the system and the only me you will need even on top of each other! Similarly, text, in to transfer in order to access "Iconix" features. the on-sheet font and current palette colors, can Jeff Hurlburt Unlike some 'power programming' add-ons, start anywhere. For example: 1(J)0 SG$ = ICONIX.GS does not gobble hugh chunks of "Welcome to Iconix Tester" plus a few POKEs The Bank (/) memory or fill up your applications (to set location and color) and a CALL will diskettes with accessory files. It DOES insist display the message in the selected color at the upon being the first Memory Manager client screen location specified. (i.e. you can't boot under Diversi Cache) and Thanks to an excellent tutorial, you can will use about 8.5K in Bank (/) for buffers. begin using ICONIX.GS in your BASIC Starting with an otherwise blank bootable programs almost immediately. On-diskette ProDOS 8 diskette, the simplest "Iconix" menu and editor utilities are all in BASIC, implementation requires ICONIX.GS and a employ ICONIX.GS, and serve as helpful Ratings BASIC program which, at some point, does a examples. In fact, slicing offthe unneeded part "BRUN ICONIX.GS". Using the POKEs and of one such program, as done in the tutorial, ~~~~. CALLs outlined in the manual, you could leaves a kind of 'Blank Master' program. You ...... SUPERB switch the super-res screen on and off, do have all the lines you need to start a new ~~~...... EXCELLENT screen clears, create and 'flash' (Le. invert) application; and sticking with the variable variously sized color bars, and move/read the names defined in the examples (e.g. "DS" for ~~~ VERY GOOD mouse cursor. Not very interesting; but add the "Display Screen" CALL address, etc.) ~~ GOOD super-res screens; and viola!, your mouse has makes it easier to treat the ICONIX.GS ~ FAIR something to point to and flashing a portion of interface like a set of newly acquired BASIC the screen can mean something. An "SHGR super-res commands. @ POOR Bloader" routine in ICONIX.GS lets you 1000­ So, can you expect 'smooth sailing' in your @@ BAD in one or more standard unpacked super-res "Iconix" programming experiences? Probably files, one per available memory bank. not. The culprits here do not include @@@ DEFECTIVE Displaying any loaded screen is then just a ICONIX.GS itself- in the few short programs matter ofPOKEing its bank number and doing I've written using the interface, everything a CALL. seems to work at least as well as advertised-; For some applications, ICONIX.GS plus nor is there any ground for complaint regarding a few super-res frames may be all you will need. nuts-and-bolts documentation. The easy-reading Most programs, however, must be able to manual is well-organized, lists all PEEKs, generate text and at least some graphics 'on the POKEs, and CALLs; and is very good about fly'; AND, since you're on a figs, these might telling the user what does what. Unfortunately, as well be in full-color super-res! ICONIX.GS once you get past the tutorial, "Iconix" is not $39.95 So What Software gets its text font and icons from a special kind nearly so effective in addressing the do's and ofsuper-res screen called an "icon sheet". This don't's, planning, and other concerns relating is a frame having a font set plus up to fourteen to 'full-blown' applications. I I icons, which you create using any ofthe popular As an example of the above: reading the painters, all on a black, (i.e. 'transparent' color "Iconix" manual, it's easy to get the impression • Requires: (/) background. This way Toolbox routines can that a user has almost complete freedom of 'lift off' font characters and pictures from your D 512K Apple figs palette colors selection. Nothing is said about 'sheet'. D one 3th" drive the need for palette consistency among icon D second drive optional The current version of "Iconix" (2.1) is sheets and loaded-in screens; and choice oficon very picky about font block location (upper left) sheet background color is treated like a wide­ No doubt you have been told that inside the and character size (8x8 pixels), which explains, open option. That, for some reason, the "Blank figs are all sorts ofnifty Toolbox routines which in part, why a "Blank Master" sheet with text Master" sheet comes with a white background could do wonders for your BASIC/ProDOS 8 font in place is supplied on-diskette. Your does not, ofcourse, help matters. (Don't forget programming, if only they were easier to get pictures, on the other hand, can vary widely in to do a black/color (/) fill before you start to! Well the same notion occurred to the people size and go just about anywhere- a very nice painting.) at So What Software- as in "so what if you feature, since practically any 'clip art' graphic Granted, some "Iconix" users will find are supposed to use ProDOS 16"-; and the becomes an icon candidate. The only catch here super-res applications development no more first result is a super-res textlgraphics-to-BASIC is that "Iconix" expects the user to tell it, via difficult than using the built-in BASIC hires interface named "Iconix". Now you can load the "Icon Edit" utility, where each icon is to commands, probably a good deal easier. No and display super-res screens, present messages be found on the sheet. This entails selecting a one, however, is likely to get through the on­ in colored text, and manipulate user-designed number identifier from the editor screen; and diskette utilities without reaching, instinctively, icons- all, together with mouse point-and-elick then, on a sheet display, clicking opposite for a can of Black Flag. The worst offenders input, without leaving the friendly realms of comers of the space containing the icon are "Palette Edit", for adjusting colors among ProDOS 8 and in-ROM BASIC! picture(s). With the resulting "icon params" the sixteen palettes, and "SeB Edit", for The "Iconix" package consists of a 3th" added, your new icon sheet is ready to be saved setting resolution and palette on a line-by-line diskette on which you find a thirty-plus page for future use. basis. Aside from observing that, as isolated manual (for on-screen perusal or dumping to Once a BASIC program loads in an icon functions, such capabilities are virtually useless, your printer), assorted editors, icon templates, sheet and POKEs an "icon bank" pointer, all and that "Palette Edit"s controls are glitchy, example mes, and ICONIX.GS. The latter, a of that sheet's icons are available for pasting, there is the problem that running either utility mere six blocks in length, is the real workhorse moving, flashing, etc. anywhere on the screen, is like rolling dice. Sometimes, a perfectly good 128 COMPUTIST #81 November I picture fIle will bomb the program; sometimes clearest 'real board' simulation yet, I predict not. Your finished work may be saved; but, most players will stick with the main screen's then again, maybe not; and, ifit is saved, there 2-D format, especially since, in 3-D, you lose is no guarantee that it will be under the fIle name SargoD4 the search and move list displays. you expect. So much for 'bad news'. The 'good So much for frills (albeit nice ones); what news' is that neither utility has a thing to do by Dan and Kathy Spracklen about the 'bottom line'?! Well, according to with accessing ICONIX.GS features. Playing $49.95 Spinnaker Spinnaker, "Sargon 4 beats Chessmaster 2000 picture file roulette is entirely optional. seven out of eight games" - decisive, but not altogether surprising since the tests were Working with''Icon Edit", your last step conducted with "Chessmaster 2000" running in icon sheet preparation is, generally, quick I on a lIe. How, one wonders, would "Sargon (one or two minutes), easy, and even fun. Still, • Requires: 4" fare against the better II series programs the program fails to check the limits you c1ick­ running on a IIgs?! D Macintosh in for each icon (too big, and it bombs); nor After obtaining the loan ofa Mac Plus, the Done 3'h" drive does it protect itself from the stuff 640-mode next problem in setting up the intra-Apple painters seem to dump into the "unused" confrontation was matching time spent per portion of a picture fIle (i.e. again, a bomb). Reaffirming "Sargon's status as the most move. Surprisingly, with the IIgs on its fast feature-laden of all personal computer setting, the divisor into documented Depending upon your painter choice, "Icon opponents", the latest edition offers a variety "Chessmaster 2000" timings was consistently Edit" can also complicate the process of ofplaying levels (5 seconds through 10 minutes around 4.0. In a 51-move game at Level 10 revising/adding-to icon sheets. While the utility per move and "infinite") plus strength modifier ("3 min/move"), "Chessmaster 2000" options to limit search depth, restrict computer will load both PIC ($C1) and BIN type actually averaged 42.2 seconds/move; in 'thinking time' to its own move, and tum off unpacked picture fIles, it always saves sheets another game at Level 7 ("2 min/move") the access to the 68,000 position opening as type BIN. Among popular painters, only average was 27.6 seconds/move, ... etc.. I ran 'library'. Add an eight-level 'all the moves' "816 Paint" and "Deluxe Paint II" will accept "Sargon 4" with 'think on opponent's time', mode (i.e. a player has 5 minutes, ... 3 hours BIN files; "The Graphics Studio" and "Window on Search", and opening library to make all ofhis or her moves in a game) and "Paintworks Gold" will not. Finally, even features 'ON', because this is the setup most "Icon Edit" is not 100% reliable when it "Sargon 4" delivers practically every players will probably want to adopt. The high­ comes to saves; so it's a good idea to save your tournament and 'skittles' setup one could wish activity 'show search tree' option was 'OFF'; stuff under a new name and do a CATALOG for. to minimize the cost, in thinking time, ofdisplay before exiting. A frequent user complaint is that computer updating. Results of a seven-game mini­ chess programs don't DO ANYTHING, except, tournament, are shown below. (Games are in "How did you get a ProDOS 16 program ofcourse, make moves. (I have long suspected the order played.) to load so fast?!" Admittedly, just such a that one ofthe reasons computers seem to play reaction from computer room visitors comes as well as they do is that, at a minute or more Sargon 4 Chessmaster Winner close to paying back an investment in So What's per move, they bore their human opponents into 30s/mv W L6B draw "Iconix". But, then, you won't need anyone committing errors.) Well, "Sargon 4" won't 30s/mv B L6W draw to tell you that your program's super-res moan, squirm, or chortle with glee; but its 1m1mv W L9 B draw displays and mouse interface have the look and "Window on the Search", Score, and search 1m1mv B L10W Sargon feel of a commercial product. Just two tree displays- all on the same screen as the 2-D 1m1mv W L10B CM 'warnings': (1) in case you decide to rewrite board, move list, and c1ocks- amount to a fair 30s/mv W L7 B CM the "Iconix" utilities, expect some competition substitute. 30s/mv B L7W Sargon from the programming fanatics at So What. As in football and presidential debates, Once this review arrives, you can be sure an much ofthe fun in chess comes from analysis. Result: Sargon 3.5 I CM 3.5 upgrade will be in the works. (2) Working with Aside from the expected take-back, change "Iconix" can be as addictive as any game. This sides, hint, game load/save, and mate-finding Anticipating that fans of other II series is one package you can 'get your teeth into'; options, "Sargon 4" will let you transfer a programs might feel left out, I also tried a boon for beginning programmers, and game's move list to clipboard memory and/or "Sargon III" and "Mychess II" against positively a feast for veterans! obtain a printout. (Unfortunately, there is no "Sargon 4" at 1 min/move. (Since "Colossus provision for saving or printout of the actual IV" does not run properly on the IIgs, it was board display.) A flexible Replay mode not only disqualified.) At Level 5, "Sargon III" just permits timed "automatic" or user-stepped about matches "Sargon 4"s speed, but not its move advance, but also allows halting at any smarts. (Evidently, the claimed "new The State of Apple Chess point with an option to continue the game from algorithms" work.) Playing white, "Sargon4" the current position. Along with your own triumphed after a hard-fought contest. Since Apple II chess has been in one of its games, on diskette Replay candidates include "Mychess II", at Level 7, averages a few periodic doldrums, when Leslie Daley at over one hundred "Great Games" plus as seconds below a minute per move. In two tight Spinnaker asked if I would like to review nearly as many problems. games, the results were even, with white "Sargon 4" for the Macintosh, there was little In an effort to better mimic 'the real thing', winning in each case. hesitation: "Sure, why not?" Plenty of Mac most Apple chess programs since "Mychess II" Naturally, as a IIgs partisan, I would like users own a II and read Computist. Besides have offered a simulated 3-D board display. to read the above as solid evidence that the which, a look at the new program vis-a-vis "Sargon 4"s comes with five piece sets, color current best in IIgs-eompatible chess is the equal established chess players running on the IIgs selection (!) on the Mac II, AND a design-your­ ofMac's best chess player. I would, except that is bound to be of interest. own-set "Sculptor" utility. While it is the best, experience playing each of the programs has

I November COMPUTIST #61 29 I ->-~:T=---~ ~:J.:I: ~ ~~ ___ - u __ =-: :- _ _ - -

~ ------convinced me that 'it just ain't so'. Granted, avoid the shadowlord. Ifyou get too close, he "Sargon 4" isn't going to overwhelm will attack and, most likely, kill your whole "Chessmaster 2000" or "Mychess II"; but, Robert Kettle party. it is noticeably the toughest opponent. A Other notes: tournament-player friend (USCF "A" rated) Playing Tips for... Attributes: The status byte is: 00-10 party, 7F­ came to the same conclusion. Predictably, best Ultima V gone, FF-not in party. Any other number at tactics and a tad weak in positional play, denotes the city they are being 'kept' in (where "Sargon 4" does, nevertheless, seem to play Origin you leave a member). a more integrated, 'human-like' game than, for Level: The optimum level is 8. Even though example, "Chessmaster 20Cl)(j)". The higher Totally by accident I found a command not a character's level can be $99, this makes battle the level, especially around, 'tournament speed' listed in the manuals that I have found to be of much harder. Fighting accuracy is terrible and settings, the less 'computer like', more great assistance in playing this adventure, it is the monsters get 5-6 turns to your I tum. entertaining its play becomes. Clearly, if you the Ctrl-@ command. This command will Clock/calendar: Numbers are entered in BCD own a Mac, you're in luck. For now, the BEST present you with a large multidigit number, of (binary coded decimal). (Example: month II in Apple chess is "Sargon 4". which the last four digits are your coordinates = $11.) on the current map, be it in the kingdom of FAST FRAMES, UPDATES, ETC. Britannia or a small village. This makes finding Playing Tips for... your way back to those special locations just Electing a President a little bit easier. There you are, digging around in your ._g~_V software stores for the perfect Election Night A.P.T·for... I m_:_" _ Party 'ice breaker' when suddenly you remember that neat new game. "Wow, justthe Ultima V Ifyou look at any door handle and you see thing!", you exclaim, "Boy am I glad I read a small dot underneath the door, it is locked. Computistl" ... Hopefully, you will have Origin Ifyou cannot see the dot, the door is unlocked. already given SSI's "President Elect: 1988" '-- .....1I Ifyou have a color monitor, the fringe around ($24.95, for 48K Apple II series) a thorough Note that for the items on block $010 (F(l).. the dot will be either purple or green. If it is tryout. The game is a cinch to get into, with FC) to be present in your inventory you must purple, normal keys can unlock the door. Ifthe an experienced player to explain things; but enter a value of$FF, with the exception ofSkull fringe is green, you must use skull keys. Two starting out with just the manual (i.e. becoming Keys for which you enter a hex value equal to places skull keys are needed are Lord British's the 'experienced player') takes a bit ofpractice. the number of Skull Keys desired. Chamber and the tower in Skara Brae. Ifyou Whether you choose candidates from the change floors (stairs & ladders), orare attacked, 7(l)..plus politician data base or create your own, Dr. Jean·Louls Torre all doors are changed to their original state. you're in for a realistic campaign-through­ election simulation including debates, trips, ® I have spent many hours trying to advertising, polls, and 'strong/weakltoss-up' A.P.T·for... deprotect Flight Simulator with no luck. I have electoral maps- all culminating in dramatic purchased COMPUTIST #36, #45, and #51. It east-to-west election night returns. For 1-3 Ultima V would seem that was all I needed... Wrong. players, any or all ofwhich may be computer­ Origin After following the instructions exactly for the directed, "President Elect'" can even run 'the third time, I decided to look at the booting code whole show' and predict the election's outcome! When you visit houses, refrain from taking to see ifit might be an error I could fix. After (Incidentally, SSI has recently published the easy to get food lying on the tables. looking at the additional code from $869-$8FI updated Dukakis parms. When you get the Remember the old saying "It is too good to be added by Christopher Dean (#51), I modified game, enter Inflation 4%, Unemployment true"? Well, it is. You will loose your... virtue! it so it copied the whole F8 ROM onto the 5.3%, GNP 3.1 %, Peace, Morale 5.5, Item language card instead ofjust pages $FC, $FD, Ratings: 7,7,7,2,7,7,6,5,8,6,9,1,8,1,7,7,3,8,1. and $FE. This allowed the disk to boot further, Speaking 5, Magnetism 5, Poise 9.) Blam Johnson but not much further. After the program recalibrated the disk arm for the first time, it VENDORS A.P.T. for... would load part of the graphic screen with garbage, change to the text screen, print "22 So What Software: 10221 Slater Avenue, Ultima V ID35", and then freeze. I snooped around a Suite 103 Fountain Valley, CA 92708 little and found that the garbage on the graphic Origin (714-964-4298) screen was the simulator's DOS. I searched and Spinnaker: One Kendall Square, Cambridge, searched but could not find out ~hy it loaded The tip in COMPUTIST #56 on page 19 MA 02139, (617-494-1200) the simulator's DOS in that area of memory. that states: you must fight a shadowlord if you Strategic Simulations Inc.: 1046 North Could anyone help me out. Rengstorff Ave., Mountain View, CA 94043 enter Jhelom, is not always true. If you enter I also have had trouble trying to (415-964-1353) a towne and you get a message that an air of ® hatred, cowardice, or falsehood surrounds you, get a working copy ofmy Olympic Decathlon the towne is not safe. This happens because (#35). The whole procedure works fine and the i The following readers contributedadditional your .character is not doing well on the virtue disk will boot up to the point where you are data to the Ultima V Attributes and Items chart which is associated with that towne. (Look in asked ifyou want to begin. Ifthe program tries on page J I. Vincent AndreltS, Robert Kettle, Dr. the Book of Lore at the towne descriptions.) disk access, it freezes. One other thing I don't Jean·louis Torre and Blain Johnson. Mike Horton To enter safely, you must go to the shrine understand is while booting, after the screen has did the actual worIc of combining the data and which corresponds to the towne and meditate. turned blue, parts ofthe screen are blacked out. updating the chart ROEXed You can enter an unsafe towne, but you must That doesn't happen with the original.

130 COIIPUTIST #&1 November I Ultima V Character data (Block $0lD, bytes $80-17F I Track $03, sector $05, bytes $80-FF and sector $04, bytes $00-7F) name player ShamiIIo 1010 MariIh Geoffm .lama Julia Dulft status S89 S99 SA9 SB9 SC9 SOO SE9 SF9 sex S81 S91 SAl SB1 SCI SD1 SE1 SF1 class S82 S92 SA2 SB2 SC2 SD2 SE2 SF2 hea Ith S83 S93 SA3 SB3 SC3 SD3 SE3 SF3 strength S84 S94 SA4 SB4 SC4 SD4 SE4 SF4 intel I il!ence S85 S95 SA5 $B5 $C5 SD5 SE5 SF5 dexter i ty $86 S96 $A6 $B6 $C6 SD6 SE6 SF6 magic points $87 S97 $A7 $B7 $C7 $D7 SE7 $F7 current hit points $88-S89 S98-$99 $A8-$A9 $B8-$B9 $C8-$C9 $D8-SD9 SE8-$E9 SF8-$F9 maximum hit points $8A-S8B S9A-$9B $AA-$AB $BA-$BB $CA-$CB SDA-SDB SEA-$EB SFA-$FB exper i ence po i nts S8C-$8D S9C-$9D SAC-SAD $BC-$BD $CC-$CD SOC-SDD SEC-$ED SFC-$FD exeer i ence I eve I S8E $9E $AE $BE $CE SDE SEE $FE name Katrina SenIri GWeDM Jolme Gom Maxwell Toshi Sadul status $199 $119 S129 $139 $149 S159 $169 $179 sex $191 $111 $121 $131 $141 $151 $161 $171 class $192 $112 $122 $132 $142 S152 $162 S172 health $193 $113 $123 $133 $143 $153 $163 $173 strenl!th $194 $114 $124 $134 $120 $154 $164 $174 intelligence $195 $115 S125 $135 $145 $155 $165 $175 dexter i tv $196 $116 $126 $136 $146 $156 $166 $176 magic points $197 $117 $127 $137 $147 $157 $167 $177 current hit points $198-$109 $118-$119 $128-$129 $138-$139 $148-S149 S158-$159 $168-$169 $178-$179 maximum hit points S19A-$19B $11A-$l1B $12A-$12B $13A-$13B $14A-S14B $15A-$15B Sl6A-$16B Sl7A-$17B exper i ence po i nts Sl9C-Sl0D Sl1C-$l1D $12C-Sl2D S13C-$13D $14C-S14D $15C-Sl5D Sl6C-$16D Sl7C-Sl7D expe r i ence Ieve I Sl9E $l1E Sl2E $13E $14E Sl5E Sl6E S17E (Block $0lD, bytes $180-1FF I Track $03, sector $04), bytes $80-FF Sex: male - $3E, female - $3F $180-181 food (0-9999) $IF0 shard of fa Isehood (00/FF) $IF7 sku II keys (0-99) Status: not present - $FF, gone - $182-183 go Id (0-9999) $IFl shard of hat red (00/FF) $1F8 lord Brit ish's CII1ulet (00/FF) $7F, present - $00 $184 keys (0-99) $1F2 shard of coward i ce (00/FF) $IF9 lord Brit ish's crown (00/FF) Health: good - $C7, po i soned - $00 $185 gems (0-99) $IF3 spyglass (00/FF) $1FA lord Brit ish's sceptre (00/FF) dead - $C4, sleep i ng - $03 $186 torches (0-99) $IF4 HilS Cape plans (00/FF) $IFB black badge (00/FF) Class: avat ar - $Cl, ba rd - $C2, $187 grappl ing hook (0-1) $1F5 sextants (00/FF) $1 FC wooden box (00/FF) fighter - $C6, mage - $CO $188 magic carpets (??) $IF6 pocket watch (00/FF)

(Block $01F I Track $03, sector $(1)

Amour IB Ar rows 46 An Sanct IIIIiock 64 Sanct Lor invisibility 7F White quick view 1C Crossbow 47 An Xen Corp repellUldtad 65 Xen Corp kill 90 Leather Helm Moonstones 10 Quarrels 48 Re I Hur wind change 66 In Quas Xen clone 91 Chain Coi f IE Long Sword 491nWis 671nQuasWis peer 90 1st phase moonstone 92 I ron Helm locate IF 2-Handed Hammer 4A Kal Xen 68 In Nox Hur poison wind 91 2nd phase moonstone 03 Spiked Helm call tmimal 29 2-Handed Axe 4B In Xen Man i creale creatJjre life 69 In Quas Corp fear 92 3rd phase moonstone 04 Sma II Sh i eId 21 2-Handed Sword 6A In Mani Corp reslirrect 93 4th phase moonstone 05 La rge Sh i eId 4C Vas Lor greal light 22 Halberd 4D Vas FI am ball offlames 6B Ka I Xen Corp SIIIIImOII 94 5th phase moonstone 06 Sp i ked Sh i eId 23 Chaos Swo rd 6C InVasGravCorp coneo/energy 95 6th phase moonstone 07 Mag i c Sh i eId 4E In FlamGrav wallo/fire 24 Magic Bow 4F In Nox Grav wall 0/ poison 6D In FI am Hu r flame wind 96 7th phase moonstone 08 Jeweled Shield 25 Si Iver Sword 6E Vas Re I Por gale travel 97 8th phase moonstone 09 Cloth 50 In Zu Grav wall 0/ sleep 26 Magi c Axe 51 In Por blink 6F An Tym time stop SpeIIIngftdients 0A Leather 27 GI ass Sword 0B Ring 52 An Grav dispell field Saolk A0 Sulfur Ash (0-99) 28 Jeweled Sword 53 In Sanct protection 9C Scale 79 VL great light Al Ginseng (0-99) 29 Myst i c Sword 54 In Sanct Grav protection field 00 Chain 71 RH wind change A2 Garl ic (8-99) 55 Uus Por upward nwve 0E Plate Magie items 72 IS protection A3 Spider Si Ik (8-99) 56 Des Par downward nwve 0F Myst i c Armor 2A Ring of Invisibi I ity 73 IA negaJe IIUlgic A4 Blood Moss (8-99) 2B Ring of Protect ion 57WisQuas reveal 74 IFlY peer A5 BI ack Pear I (8-99) Weapons 58 In Bet Xen insect .lWIITrn 2C Ring of Regenerat ion 75 KXC SIl1lllllOll A6 Nightshade <8-99) 19 Dagger 20 Amulet of Turning 59 An Ex Par IIUlgic lock 76 IMC resurrect A7 Mandrake <8-99) 11 SI ing 2E Sp i ked Co I Iar 5A In Ex Por IIUlgic rmIock 77 AT time S/Qp 12 Club 2F Ankh 5B Vas lIan i great heal Track $83, sector $87 13 FlamingOil 5C In Zu sleep PotioII5 14 Ma i n Gauche Spells 50 Rei Tym quickness 78 Blue awaken 00 X-Coordinate 15 Spear 40 In Lor light 5E InVasPorVlem trenwr 79 Vellow heal 01 V-Coordinate 16 Th row i ng Axe 41 Grav Par IIUlgic missile 5F Quas An Wi confuse 7A Red CIIre 1A-1B Year (8080-9999) 17 Short Sword 42 An Zu awaken 60 InAn negate IIUlgic 7B Green poison 1C Month 18 Mace 43 An Nox CIIre poison 61 WisAnVlem x-ray 7C Orange sleep 10 Day 19 Morn i ng Star 44 Man i heal 62 An Xen Ex charm 70 Purple change shape IE Hours lA Bow 45 An Vlem disintegrate objects 63 Re I Xen Bet change creature small 7E Black invisibility IF Minutes

I Novembel' COMPUTIST #81 31 I 03-Hobbit, 04-112-El{ 05-1I2-orc, 06-Gnome 2F AF Arrno r CIass: lewers the initial armor i This page is the result ofthe combinedefforts 28 AS Sex: 00-Male, 01-Female class of the character before normal annor is ofThomas Rapheld, Brian Symonds, Harold Day, 2C AC Character's Picture: (Missing worn. Bob Igo and Donald Jones...... RDEXed sequential numbers are blank pictures) 30-5380-D3 Items carried: the 12 items that each 00 =Refugee Camp, 01 =Viper, 02 = character can carry are stored in groups of OO-OF 80-8F Name of Character Hobgoblin, 03 =Lizard, 04 =White Dog, three bytes with the first byte meaning 10 99 Strength 05 =Red Devil, IlJ6 =Imp, 08 =Serpent, unequipped ($00), equipped ($01), can't use 11 91 Intel I igence (IQ) fJ1) =Nomad, OC =Dinosaur, 13 =Wear ($02), or special characteristics (for example 12 92 Dexter i ty Tiger, 15 =Fish Man, 19 =Lizard Priest, $08 means the enchanted water of life), the 13 93 Constitution lA =Dark Gnome, IE =Bug Man, IF = second byte giving the item itself, and the third 14 94 Luck Giant, 20 =King on Throne, 21 =Blood byte giving the number of times the item can 15-18 95-98 Experience Knight, 24 =Skeleton, 26 =Wizard, 27 = be used. 19-1C 99-9C Gold Mage, 28 =Ghost Armor, 2C =Lizard 54-55 04-D5 Con jurer Spe I Is lD-IE 9D-9E Current Level Mage, 2E =Tree Iw Falling Apples, 2F = 56-57 06-D7 Mage Spe II s IF-29 9F-A9 Max Leve lAttai ned Old Man, 30 =Female Warrior, 31 =Robed 58-59 D8-D9 SorcererSpells 21-22 AI-A2 Hit Points Priest, 32 =Empty Building, 34 =Treasure, 5A-58 DA-D8 1'/ i za rd Spe II s 23-24 A3-A4 Condition 36 =Sorcerer, 37 =Female Mage, 38 = 5C-5D DC-DD Archmage Spe II s 25-26 A5-A6 Current Spell Points Shore Line, 39 =Avenging Angel, 3D =Red 5E-60 DE-EO Ch ronomance r Spe II s 27-28 A7-A8 Max Spe II Po ints Dragon, 45 =Study, 46 =Rock Elephant, 61-62 EI-E2 Geomancer Spe II s 29 A9 CI ass: 00-Warrior,01-Wizard, 4A =Dead Old Man, 4E =Roating Eye, 53 63-64 E3-E4 Misc. Spe II s 02-Sorcerer, an-Conjurer, 04-Magician, =Bartender 64 E4 Critical Hits (Hunter) 05-Rogue, IlJ6-Bard, 07-Paladin, 08-Hunter, 2D AD Hea Ith: 00-Good, 01·Poisoned, 02-Qld, 64-65 E4-E5 8a rd' s Songs 09-Monk, 0A-Archmage, 0B-Chronomancer, 03-poisoned, 04-dead, 05-dead and go to 64-66 E4-E6 Th ief Ab iii ties OC-Geomancer, 0D-Monster, 0E·illusion Adventurer's Heaven 67-68 E7-E8 ? 2A AA Race: 00-Human, 01-Elf, 02-Dwarf, 2E AE ??????? 69 E9 Mu Itip Ie Attacks: critical hits modifier

BB Empty Pockets 29 Fin's Flute 52 Breath Ring 7B Va Iar ian's Bow A4 Left Key CD Hourglass Bl Torch 2A Kael 's Axe 53 Dragonshield 7C Arws of Life A5 Lever CE Th i eves Hood B2 Lamp 2B Mthr Arrows 54 Dmnd PI ate 70 Canteen A6 Nut CF Su rehand Amu Iet B3 Broadsword 2C Dayblade 55 Wargloves 7E Titan Plate A7 Bol t #B DB Thieves Dart B4 Shortsword 20 Shield Staff 56 Wizhelm 7F Titan Sh i eId A8 Spanner 01 Shri II Flute B5 Dagger 2E EI f Cloak 57 Dragonwand 8B Titan Helm A9 Shadowlock 02 Ange I'sHarp B6 War Axe 2F Hawkblade 58 Deathr i ng 81 Fi re Spear #B AA Shadow Door 03 The Book #B 07 Halbard 3B Admt Sword 59 Crysta I Sword #0 82 WiliowFlute AB Miser i corde 04 Troth Lance 08 Long Bow 31 Admt Sh i eId 5A Speedboots 83 Firebrand AC Ho Iy Avenge r 05 Dmnd Su i t 09 Staff 32 Admt He 1m 5B Flame Horn 84 Holy Sword AD Shadowshiv D6 Dmnd Flai I BA Buckler 33 Admt Gloves 5C Zen Arows 85 Wand of Fury AE Ka Ii's Garrote 07 Purple Heart 0B Tower Sh i eId 34 Pureblade 50 Deathdrum 86 Lightstar AF FlameKnife 08 Titan Bracers BC Leather Armor 35 Boomerang 5E PipesofPan 87 Crown of Truth BB Red St i Ietto 09 Eelskin Tunic BD Cha in Ma i I 36 AI i 's Carpet 5F Power Ri ng 88 Belt of All i ria Bl Heartseeker DA Sorcerer's Hood BE Scale Armor 37 Luckshield 6B Song Axe 89 Crysta I Key B2 x #B DB Dmnd Staff BF PI ate Armor 38 Dozer Fgn 61 Trick Brick 8A Tao Ring B3 x DC Crysta I Gem IB Robes 39 Admt Cha in 62 Dragon Fgn 8B Stealth Arrows #B B4 x DO Wand of Force 11 Helm 3A Death Stars 63 Mage Fgn #B 8C Yellow Staff B5 Dmnd Sca Ie DE CI i Lyre #B 12 Leather Gloves 3B Admt Plate #B 64 Troll Ring 80 Steady Eye B6 Holy TNT OF Youth Pot ion 13 Gauntlets 3C Admt Bracers 65 Aram's Kn i fe 8E Di vine Ha Ibard B7 Eterna I Torch EB x 14 Mandol in 3D Slayer Fgn 66 Angra's Eye 8F Incense B8 Oscon's Staff El x 15 Spear 3E Pure Shield 67 herb Fgn 9B I-ching B9 Angel's Ring E2 x 16 Arrows 3F Mage Staff 68 Master Wand 91 Wh i te Rose BA Deathhorn E3 x 17 Mthr Sword 4B War Staff 69 Brot he rs Fgn 92 Blue Rose BB Staff of Mangor E4 x 18 Mthr Shield 41 Th ief Dagger 6A Dynamite 93 Red Rose BC Tesla Ring E5 x 19 Mthr Chain 42 Sou I Mace 6B Thor's Hammer 94 Ye Ilow Rose BD Dmnd Bracers #B E6 x lA Mthr Scale 43 Ogrewand 6C Stoneblade 95 Ra i nbow Rose #B BE Death Fgn E7 x IB Gi ant Fgn 44 Kato's Bracer 60 Ho Iy Handg renade 96 Mag ic Tr i ang Ie BF Thunde r Swo rd E8 x lC Mthr Bracers 45 Sorcer Staff #B 6E Masterkey 97 x CB Po i son Dagge r E9 x #B 10 Bardsword 46 Galt's Flute 6F Haspin Ring 98 Hammer of Wrath Cl Spark Blade EA-EF x IE FireHorn 47 Frost Horn 7B Crysta I Lens 99 Ferofist's Helm C2 Galvanic Oboe FB Mthr Suit IF Li tewand 48 Ag's Arrows 71 Smokey Lens 9A x C3 Hamonic Gem F1 Titan Suit 2B Mthr Dagger 49 Dmnd Sh i eId 72 Black Lens 9B x C4 Tung Sh i eId F2 Mages Gloves 21 Mthr Helm 4A Bard Bow 73 Sphere of Lanat i 9C He 1m of Just i ce C5 Tung PI ate F3 Flare Crystal 22 Mthr Gloves 4B Dmnd He 1m 74 Wand of Power 90 Sceac Iu's CIoak C6 Minstrels Gloves F4 Ho Iy Miss i Ie #B 23 Mthr Axe 4C Elf Boots 75 Acorn 9E Shadelance C7 Hunters Cloak F5 God's Blade 24 Shur i ken 40 Vanqu isher Fgn 76 Wineskin 9F Black's Arrows #B C8 Dea t h Hamme r #B F6 Hunte r Blade 25 Mthr Plate 4E Conjurstaff 77 Nightspear #B AB We r ra's Sh i eId C9 Blood Mesh Robe F7 Staff of Gods 2"6 Mol ten Fgn 4F Staff of Lor #B 78 Tslotha's Head Al St r i fespear CA Sooth i ng Ba 1m F8 Horn of Gods 27 Spell Spear 5B Flame Sword 79 Ts Iotha' s Heart A2 Sheetmusic CB Mages CIoak F9-FE x 28 Sh i eId Ri ng 51 Powerstaff 7A Arefol ia A3 Right Key CC Fami liar Fgn FF x #B I 32 COMPUTIST #81 November You can copy any of the disks in the Toolkit". Change the modify in step 2 to Calculus Toolkit series with a standard disk 600E:EA EA EA A9 00 and deprotect this Donald Jones copier such as COPYA. However, when you disk too. try to boot the copied disk, it hangs and tells You're done! A.P.T. for... you that you had a copy protection error. This hangup and message comes right after the Bard's Tale OJ BASIC prompt appears so the protection Put a deprotected "Where in Electronic Arts scheme or call to a scheme must be in the HELLO program. Loading the HELLO Europe is Carmen Sandiego" The characters are saved on the last two program and listing it reveals that it BLOADs 1 a file called 'C', does a few POKEs, and then onto a 3/2" disk tracks ($21-22). A text search will reveal where executes a USR function. The rest of the your character is on the disk. • Requirements Is your Mage still looking for the three program is gibberish. Hmmmm. The 'c' fIle miscellaneous spells? Just input a 3F 80 for must contain the decoding routine and probably also contains the copy protection scheme. Going o Deprotected Where in Europe is Carmen bytes $63-64 ($E3-E4). When you start Sandiego disk (2 sides) changing your warrior's into Geomancer's and into the monitor, BLOADing the 'c' fIle, and then checking $AA72.AA73 (starting address o 3'12" disk you want all the spells (including the misc.), o ProDOS Copy II Plus (versions 6-up) use FF for the bytes. With your magic user's of a binary file) and $AA60.AA61 (length of a binary fIle), I found 00 60at $AA72.AA73. o Disk with the BASIC.SYSTEM system file change all to FF to receive max spells. To on it become a Chronomancer, put FF's in bytes I did a 6Q)Q)0L to take a look at the beginning $5E-60 ($DE-E(D). Ifyou want an Archmage of the code. Here is the disassembly you will I recently had the chance to play a with no Chronomancer spells, put FE at $5D find on DISK 1, DISK2, DISK3, and DISK4: deprotected version of Where in Europe is ($DD). 6000 A9 FF LOA #$FF set RUN flag Carmen Sandiego over at a friend's house. It Some ofthe abilities are stored at the same 6002 85 D6 STA $06 continues the Carmen Sandiego tradition offun locations depending on what class your 6004 A9 00 LOA #$00 with learning. I noticed that the disk was character is. For example; the Thieves abilities 6006 80 F2 03 STA $03F2 set up RESEI'veetor ProDOS based and came on both sides ofa 5 tA " are stored at bytes $64-65-66, whereas the 6009 A9 60 LDA #$60 floppy disk. My friend has a IIgs with a 3'12" Bard's songs are stored at bytes $64-65. These 600B 80 F3 03 STA $03F3 disk drive and her young children use it alot. are also the locations for ~~~ miscellaneous 600E 20 31 61 JSR $6131 to protection scheme I thought to myself, "Why not fix the program spells for all magic users. 6011 A5 01 LOA $01 is this an original? so that it would run off of a 3'12" disk so the ® A challenge for you graphics 6013 C9 00 CMP #$00 kids wouldn't have to worry about whether or people. Can you find a way to make your own 6015 0004 BNE $601B no, go bomb not they put the correct side in?" After an hour picture and store it to the character disk? The 6017 20 5F 60 JSR $605F decode routine or so of seeing what was on both sides, I came article in COMPUTIST #53 by Greg Poulos 601A 60 RTS go back to ApplesoJt up with this procedure. might give you a clue. It tells how to use 601B 20 F5 60 JSR $60F5 print message & bomb CD Boot Copy II Plus. E.O.A. RWTS. The pictures available for your IT] Format the 3'12" disk with a dummy characters are limited. For example they only Look around $6131 ifyou want to see some name of "/DUMMY". give two types of Females to use. It would be genuine signature check code. What I did was nice to personalize the game a little more. to remove the call to the protection and to load u=J Copy the ProDOS system fIle from memory location $01 with a 00 if case any your Copy II Plus disk to the newly formatted ® How do I convert an AppleWorks 3'12" disk. file to a standard DOS 3.3 text file! I've always more checks were made down the road. The used AW to do all my proccesing, and I was changes to make are: [!:::J Now copy all of the fIles except woundering ifthere was a way to convert them. PRODOS from the Where in Europe is Carmen In addition has anybody been able to sector 600E EA EA EA NOP Sandiego disk to the 3'12" disk. edit 'WINGS OF FURY'? I would like to rig 6011 A900 LDA #$00 6013 85 01 STA $01 u=I Create a subdirectory on the 3'12" disk it like 'RESQUE RAIDERS'. with the name "SIDE.2". I then BSAVEd the fIle back to disk using the values I found and the disk was deproteeted! IT] Copy the DATA file from the second Jim S Hart side ofthe Carmen disk into the newly created CD Copy the Calculus Toolkit disks onto subdirectory "SIDE.2". the blank disks using the whole disk copier. Now we need to change the pathnames Softkey for... IT] Boot the blank initialized DOS 3.3 within the Carmen program to look for the disk. Insert a copied toolkit disk from step 1. DATA program in the subdirectory SIDE.2 The Calculus Toolkit instead ofthe disk named /SIDE2. This allows Addison-Wesley CALL ·151 enter monitor the DATA fIle to be on the same disk as the BLOADC main program. • Requirements 6881.6814 verify 2(/) 31 61 A5 (/)1 CY (/)(/) 6HE:EA EA EA A9 H 85 81 and modify C[] Get into BASIC from ProDOS o A blank disk for each Toolkit disk BSAVE C,AS68H,L$1E4 (execute the BASIC.SYSTEM fIle, in other o Standard disk copy program words). o A DOS 3.3 initialized disk with no hello u=J Repeat step 2 for DISK1, DISK2, ITJ Insert the 3'12" disk into a drive. program DISK3, and DlSK4. o A fast DOS, such as Diversi-DOS or Pronto IT] The fifth disk in the toolkit is called RlNAME IDUIIMY,/CARMEN.EUROPE DOS (optional) ..A Calculus Student's Microcomputer BLOAD B,A$1BH

I November COMPUTIST #61 33 I - -~~~~~~~~~------~~~-~~~~-~---~-~

found this lack ofthe ability to autoboot to be CALL ·151 C!:J Use Bag ofTricks (Quality Software) annoying to say the least. I thought there must 1D3UD38 verify 2F 73 f9 64 65 and re-skew the disk to a 9 descending skew. be some easier way to go about starting up my IOM:73 • 8465 21 and modify This really speeds up the loading ofthe game. ISAVlI Thexder game. I found the answer and if you Softkey for... follow the steps below, your Thexder disk can Note: Ifthe bytes did not match, then use be fixed up so that it too will autoboot. a block editor to search for 2F 73 69 64 65 and change to 73696465 2E. Micro Addition/Subtraction u=J Boot up your ProDOS 8 disk with Now you can use the 3 'I.z" disk to play the Hayden Software Company BASIC.SYSTEM on it and get into BASIC. game and never have to flip disks over again IT] Insert your backup Thexder disk intQ for it. A side benefit is that the program loads • Requirements the 3 'I.z" drive. quicker (especially ifyou have DSR's Diversi­ PRErIX /TIIEXDER Cache installed). o I blank disk o COPYA u::J Now rename the Thexder file so that Softkey for... o Sector editor it will be used as the ProDOS 16 boot fIle.. Micro Addition/Subtraction is an RlNAIII TllElDD,TllElDER.SYS16 Spiderbot educational program designed for the younger Create a subdirectory to hold all ofthe Epyx children. It teaches elementary addition and C!:J ProDOS 16 setup fIles. subtraction skills, but the problems are really • Requirements elementary so they are best suited for younger CREATE SYSTIII children who are just learning to add and o I blank disk subtract. [I] Go into the SYSTEM subdirectory. o COPYA The protection scheme used here is the and create two more subdirectories to hold the o Sector editor standard epilog change. The epilog bytes for Tool setup fIle and the necessary toolji. o COMPUTIST #57 (for reference only) both address and data fields are AA AA instead PRErIX /TIIEXDDlSYSTIII o Bag of Tricks (if you want to speed up the of the normal DE AA. This is a simple protection CREATE SYSTIII.SI'nJP loading of the game) to overcome. CREATE 'fOOLS Spiderbot, another in the Maxx Out series u=J Boot your DOS 3.3 system disk. [!::J Boot your ProDOS fIle copying from Epyx, is an interesting little game in which u=J Tell DOS to ignore checksum and program. Copy the fIles below from the llgs you, the spiderbot, have to collect parts of epilog errors and use COpyA to copy the disk. System Disk (/SYSTEM.DISK) to the Thexder yourself and ensnare a variety ofbaddies using disk (lTHEXDER). your spider webs. Overall it is an OK game, POD 474Z8,H PlODOS but it is not up to the standards that it's RUII COnA SYSTIIIIPl& predecessor, Deathsword, established. u::J Make the following sector edits to the SYSTIIIITOOLS/'IOOL12S The protection here is essentially the same copy you just made. SYSTIIIISYSTIII.SI'nJP/'IOOL.SITUP as other recent Epyx releases. I refer you to my softkey for Boulderdash Construction Set which Trk Sct Byte(s) From To After you have finished, your Thexder disk appeared in COMPUTIST #57 (pp. 17-20) for $8S $83 $35 AA DE should be arranged as follows: a more thorough explanation ofthe protection $91 AA DE ITHEXDER scheme. Ithas been slightly altered here, in that prodos zero page locations $F8-$FF are used instead You're done. thexder.sys16 of $F0-$F7. Also, the values to put into these IDATA (1IIJ1le of rhese files were altered) locations are in a different order and the location ISYSTEM to jump to after loading the correct values is A self-booting Thexder p16 slightly different. Aside from those few ISYSTEM.SETUP changes, the rest of the softkey is the same. • Requirements tool.setup ITOOLS o::::J Boot your DOS 3.3 system disk. o Backup copy ofthe original THEXDER disk tool825 Tell DOS to ignore checksum and u=J o llgs System Diskv3.1 or later or, ifyou have Copy II Plus, a catalog will epilog errors and use COPYA to copy the disk. o 3'1.z" disk drive reveal: POD 47.,Z4 o ProDOS file copy program ITHEXDER---->DATA IUllCOnA o ProOOS formatted disk with PROOOS 8 and ! BASIC.SYSTEM on it !--->SYSTEM------>SYSTEM.SETUP u::J Make the following sector edits to the ! copy you just made. Don't forget to write the The arcade game Thexder is an excellent !--->TOOLS modified sector back to disk. game for the llgs owner; top notch graphics, sound, and play action are woven together to Your Thexder disk can now boot by itself Trk Sct Byte(s) From To produce an unforgettable gaming experience. and the game will load in automatically. As an $SS $85 $88-18 ? A9 E7 85 F8 85 The one problem, so to speak, of Thexder is extra bonus, pressing the 'J' key will toggle FB A9 FC 85 F9 that it does not boot on its own. You are Joystick mode. No longer do you have to 85 FC 85 FF A9 required to first boot into a program selecter, always use the numeric keypad. I have found EE 85 FA 85 FD such as the Launcher or Finder, and then insert that the joystick tends to center to the lower 85 FE 4C 78 BB your Thexder disk to run the game. A few disk right hand corner, so you may have to re-adjust swaps later and your game is ready to go. I your trim pots.

COMPUTIST #61 November I 1 34 9540: 4B 08 A9 95 80 4C 08 A2 $3F59 the front side, the ProDOS title screen comes 9548: 60 4C 0108 2C E8 C0 A2 $090B up and then almost immediately the program Capturing a protected disk's 9550: 00 BD 00 B8 900019 E8 $A813 reboots. Since the rebooting occurs right after 9558: 00 F7 EE 53 95 EE 56 95 $5133 the ProooS title screen, a good place to look RWTS with RWTS Worm 9560: AD 53 95 C9 C0 00 E8 A2 $05C5 for the copy protection code is in the first 9568: 00 BO 00 60 90 00 90 E8 $AF53 ".SYSTEM" file in the directory. Looking through the various softkeys from 9570: 00 FlEE 6B 95EE 6E 95 $3267 The first ".SYSTEM" file is called issues past, you notice that many of them 9578: AD 6E 95 C9 C0 00 E8 4C $F97A MATH.SYSTEM and the file right after it is require a copy protected disk's RWTS. This 9580: BF 90 $05F9 called BOOT. SYSTEM. The MATH.SYSTEM RWTS is used to read in the copy protected disk file is only one block long, hardly enough to and then write out the information just read in BSAVI RWTS WORII,~,'" do anything except maybe check for an original onto a normally formatted 16 sector disk. This disk?!?!? That's exactly what it does. After is an easy way to deprotect a disk, but obtaining SAMPLE RUN verifying the presence ofthe original disk, the the necessary RWTS is often difficult. I present file BOOT.SYSTEM is then executed. here a way to get that elusive RWTS. The lTI Boot a DOS 3.3 formatted disk and Well, it seems apparent what our course program that accomplishes the feat is called load RWTS WORM. of action is: alter the disk so that RWTS ·Worm and is written in machine BLOAD RWTS WORll,A$95(M MATH.SYSTEM is not executed and instead language. This program works for all protected BOOT.SYSTEM is executed. This is easily disks that employ a standard DOS 3.3 first stage CD Take out the DOS 3.3 disk and insert accomplished. After ProooS is loaded, it looks boot, i.e. track $00 sector $00 is the same your protected disk into slot 6, drive 1. in the volume directory for the first as a normal DOS 3.3 disk, and run off of a ".SYSTEM" file and executes it. Ifwe renam'l. semi-normal DOS 3.3. With most semi-normal LI:J Execute the RWTS WORM program. MATH.SYSTEM to MATH, then it is never DOSs, a BASIC prompt 0) appears after the CALL 38144 from monitor 9500G executed! Since BOOT.SYSTEM is now the first three tracks have been loaded in. first" .SYSTEM" file, it is executed which is C!J The disk drive will sound like it is exactly what we want. booting and after a few seconds the BASIC What It Does prompt 0) will return. The protected disk's IT:J Copy both sides ofthe MATH SHOP When run, RWTS Worm first disconnects RWTS has beenrelocated to $1900-20FF. original. DOS via a JSR $9000, which replaces DOS' [I=:J All you have to do now is to save the L!:J Go into BASIC or use a ProooS disk I/O hooks with the normal BASIC I/O hooks. RWTS to disk. Insert your Super lOB disk. utility program and rename MATH.SYSTEM The DOS 3.3 in memory is moved down so the programnome.RWTS, to MATH. upcoming boot does not overwrite it. Next, the BSAVI ASl., L$M disk controller ROM that lives at You're done. You can now use Super lOB RlNAIII MATB.SYSTEII, MATH $C600-$C6FF is moved down into RAM and the SWAP or NEW SWAP controller to memory and modified to the extent that only deprotect the disk. If you want to use RWTS Softkey for... the disk's RWTS is loaded in. Once this has Worm on another disk, you will first have to been done, the newly read in RWTS is moved reload it into memory because the code it to $I900-$20FF. Finally, the DOS 3.3 that contains is self-modifying. ARCHlVEmatb I D.C. Heath & Company was in memory when you loaded the RWTS ------' Worm program is moved back to it's normal Softkey for... I • Requirements resting spot and it is reactivated via a JMP $9DBF (DOS 3.3 warmstart location). MatbSbop o 2 blank disk sides RWTS Worm will probably not work on Scholastic Inc. DFID a disk that has a non standard DOS 3.3 track o Super lOB v1.5 $00, sector $00 or whose BOOTI does not • Requirements load in at $B700, but you can try it anyways. ARCHlVEmath is a rather good college A word ofcaution: the program assumes your o 2 blank sides algebra test generating program. You may disk controller card is in slot 6. If it is in any o Whole disk copy program, such as COpyA choose from several areas in math and print up other slot, RWTS Worm will not work. o ProooS file utilities or ability to get into to 99 different tests in each area. Examining IT:] Boot a DOS 3.3 disk and go into the ProooS BASIC the disk's format with my trusty nibble editor, monitor. Type in the machine language the only protection is that the third byte ofthe Math Shop, by Scholastic, is a .math prolog (05 AA is an AA instead of the hexdumi> and save it to disk. data AD) oriented educational program. In the Math Shop normal AD. Aside from that, the only CALL -151 game, you are required to go to one ofseveral inconvenience is that you need to use the different stores and •• serve" the customers by original DOS on the disk because it contains RWTSWORM figuring out math problems. After you have routines that the programs need to run. satisfied all ofthe customers in one store, you Load Super lOB and install the FAST 9500: 20 E0 9E A2 00 BO 00 90 $05E4 IT:J must go to another store and continue on controller into it. 9508: 9000 60 E8 00 F7 EE 07 $1El0 "serving" them. This becomes quite a task ·9510: 95 EE 0A 95 AD 07 95 C9 $l2AF when you have 10 stores each with 6-7 D:J Fix the controller so it only copies 9518: C0 00 E8 A2 00 BO 00 C6 $0750 customers! If you ignore the customers in a DOS (tracks $00-(2). 9520: 90 00 96 E8 00 F7 A9 33 $BA6B store for too long, they will leave thus depriving 1115 LT = 3 9528: 80 F9 96 A9 95 80 FA 96 $8B06 you of their "business". 9530: 4C 0096 A9 90 800E 08 $F51A Copying both sides of the disk with LI:J Run Super lOB and answer "YES" 9538: A9 4C 80 4A 08 A9 4C 80 $00B9 COpyA results in no problems. Upon booting to the format disk prompt.

COMPUTIST I8t I November 35 1 - ~_ - __.;. =-l ~l: [~} ¥_& __ _ ]: ~1. f ~ ~ _-

------~------

BB6E DEY a:J Repeat step #3 for the back side ofthe 811<....BITI'II ARCHNEmath disk. BB6F BPL BB68 I then inserted the Dondra original and BB71 JMP $BB7C o:::J Now, from the BASIC prompt (]), moved the boot ROM code down to RAM and BB74 FC EE EE FC E7 EE FC E7 load FID. changed it so it would stop after the first stage load. BLOADFID CD Copy the remaining sides with Super I611

I 36 COMPUTIST #61 lIovembe.. I Softkey for... 1130 5T =0:TK =TK +1: IF BF =0ANOTK 3THEN CALL 6409:UB =1 C1IIId Yeoger's AJlwDtud JifigIIt Tl'diIIer Electronic Arts TolJlll1ulwk ? 1960 G05UB 430: G05UB 109: 5T =5T +1: IF 5T

I November COMPUTIST #81 37 COMPUTIST ba~k issues To order, Use the back issue order form on page 42

Kit DOC's ICUring Fatal System Error #0911 IRealtime Situation 60 1988. Features: IReading from Protected Control using CDAs "Chuck Yeager's Advanced Right Trainer 55 May 1988.Features: IA Utility to Save the Disks IEDASM Transfer Utility IAmper QuickDraw II Routines IffiM Notes IHeip Wanted! Lower 8Pages of Memory IBard's Tale Effects Locator IHow ISiow Speeds for Arcade Games IA Patch for Copy II Plus IThe to Capture Phantasie SCreen Maps "Alternate Reality Character Product Monitor lLow Cost Alternate Languages IAnother 57 1988 • Features: IElectronic Art's Protection Editor 'Updating the ProOOS Block Editor ILoading Rashcalc method for Copy·Protecting DOS 3.3 IChange Appleworks Language IHow to find hidden code with EOR DiskSCan IHere's onto your RAMcard IACopy·protection SCheme for ProDOS Cursor from ablinking underline to ablinking apple in one quick another look at ILower Case &Infocom Games IMonsters of IThe Product Monitor IAuloduel Car Editor • Sohkeys: patch. Sohkeys: lAce Programmer lAeSOP'S Fables (GS) Might &Magic IA Character Editor for Rings of Zilfin IA Single IAlphabet Sequencing IAnimai Alphabets and Other Things IApple GEOS v2.0 IArtic Antics ICreating the Constitution Data Disk for all your Print Shop Graphics IThe Product Monitor IArctic Antics IThe Boars' S10re IThe Boars Tell TIme "Career "Crossword Magic 4.0 lDeath Sword IDome Bookkeeping • Sohkeys: IAmerican Challenge IArctic Fox lBard's Tale , Focus ICastle Wollenstein IChartie Brown's 123's ICharlie IEssentiai Data Duplicator III (EDD 3) IGarfield Deluxe Edition II IBoulderDash Construction Set ICalifornia Games Brown's ABC's ICity Country Opposites "Coveted Mirror IGauntlell1gs IJ &SGradebook lKings Ouest IIgs IKings Quest IChampionship Wrestling IChief of Detectives/Drawing ICreate With Garfield ICrypt of Medea ICustomized Alphabet I (GS) ILazer Maze ILeisure Suit Larry IMagical Myths Conclusions lDeep Space lDome Simplified Bookkeeping Drill'Customized Rash Spelling IDig Dug IDigitai Paintbrush IMasterlype v2.1 IMavis Beacon Teaches Typing IMind System lOr. Ruth's Computer Game of Good Sex IEarth Orbit System IEstimation IFay: Word Hunter lFix It IFocusing on Prober/Mind over Minors INATO Commander v1.2 IPaperboy Stations IFactory IGaiaxy SearchIPredicting Outcomes IGame Language Arts IFundamental Capitalization IFundamental IPegasUS IPinbail Construction Set IPooI1.S lRAD Warrior Maker IHacker II IHardbail IIgs Ilkari Warriors lLabyrinth Punctuation Practice IFundamental Spelling Words in Context lRailroad Works IRoad Rally USA IRobomath "SCience Tool IMarble Madness "Master Diagnostics lie IMath Blaster IThe Hobbit IHomonyms in Context Iindividualized Study Kit lSearch and Rescue "Showeff lSocial S1udies Vol 1lSociai IMickey's Space Adventure IMicro-Computer Learning Games Master Iinside Outside Shapes "Inside Outside Opposites S1udies Vol 2lSoio Flight ISpace Quest ISpringboard Publisher IMicrozine #14 'Microzine #24 IMilliken Math Series IMind 'Leisure Suit Larry in the land of the Lounge Lizards IMaster ISpy VS Spy ml S1ar Fleet Iv2.1 ITales of Fantasy: The Dark Prober 1M - ss - ng L- nks IMorning Star Spelling"Mountain Diagnostics II &II +IMastertype v2.1 IMathematics Series IMr. Tower, Frog &The Fables ITapper ITrol1 Courseware: Maps ClimbinwCause and Effect lMovie Monster Game IPond IRace and Mrs. Potato Head IPaper Models· The Christmas Kit &Globes, latitude &Longitude IType! IUltima VIWagonS West Track/Reading for DetaillReading Comprehension Main Idea IPeanuls Math Matcher IPeanuls Maze Marathon IPeanuls "Zorro .IAPTs: IKid Niki Radical Ninja ILode Runner & Details· IRings of Zilfin IRoadwar 2000 ISchool Picture Puzzlers IPerry Mason: The Case of the Mandarin ISpace Quest lie IThexder • IPlaying Tips: 12400 A.D, Daysllnference "Ski Crazed lSoftswitch ISub Mission ITime Murder IRailroad Works IRandom House Library lManagement ICaptain Goodnight ISpace Quest lie • INotes: IDefending Capsule/Reading Skills ITuesday Morning Quarterback Programs IRocky's Bools vA lSensibie Speller ISnoopy's the Crown with "Visit Monitor" IFormatting extra tracks ITypewriter IWhere in Europe is Carmen Sandiego Reading Machine ISnoopy's Skywriter SCrambler ISnoopy to IMerging controllers with Super lOB IMore on Tower of IWortgefecht IXevious .APTs: lDeep Space IH.E,RO, the Rescue ISnoopy Writer ISpelling Demons "Stock Market Myraglen lSome notes on Electronic Arts lSome notes on Epyx IMoebius IRings of Zilfin IRoadwar 2000 • Playing Tips: Simulation IStory Builder IStory Slarter lS1udio IIITest Maker ITIps for cracking IIgs 31h" disks IBMI Softkeys: IClipper IArcticfox "Castle Wolfenstein IConan IDonkey Kong "Ultima IThink Quick v1.() ITournament Bridge ITutorial lDoubleDOS v1.0 ILoadCalc v4.13 IMind Prober IV ffiM Sohkeys: Symphony vl.OO ITK! Comprehension ITyping is aBall, Charlie Brown "Under Fire "Word Blaster IWord Count IWord Mount"Your Personal Net 59 1988.Features: lBoot IIc Utilities on any 56 1988 • Features: IAppIe IIgs Secret Weapon Worth • APTs: IUnder Fire ffiM Feature: IRight Simulator compatible IHeip with Ultima VlConvert Prinlmaster graphics "S second fastboot into Locksmith 6.0 Faslcopy IThe Product RGB Modifications into Print Shop graphics I The Invincible Bard (III) IThe Monitor ITaking the grind out of Championship Wrestling Deprotection Game IPatching ProDOS 1.1.1 IThe Product IMaking some improvemenls to The Nibbler • Softkeys: 12400 54 April 1988 • Features: IPicture Loader IHow Monitor IAppleWorks and the ImageWriter II • Sohkeys: AD 140' Graphics Studio IAccoiade Comics IAesop's Fables To Make DEMUFRN PLUS IConvert Print Shop graphics into IAPBA Major League Players Baseball IBetter Working: IAmerican People IAnimai Hotel IApplawriter lie IArcade Print Master graphics llower case letters For Your Apple II Plus Spreadsheet "Better Working: Word Processor lBeyond Pinball Album #1 IArctic Antics IBaHbiazer IBard's Tale II: The Destiny IThe Product Monitor IAppie IIc Paddle Fix lSoftkeyfor Daisy lBoulderDash Construction Kit ICaiendar ICalendar Crafter Kn~ht lBard's Tale IIgs ICat'n Mouse IChampionship Wrestling Professional 'Most·Protected' Award IDOS EOR Maker oCaIifomia Games IChampionship Baseball IClip Art Collection "Charlie Brown's 1,2,3's lCobra Cavern lColor Me "Create With • Sohkeys: A2·PB1 Pinball IAnimate IBank Street Music vol 1lCours Et Gagne v1.0 IDazzie Draw IEverbody's Planner Garfield IDavid Winfield's Batter Up! lDestroyer IDisk Optimizer Writer lBoulderdash Construction Kit ICainornia Games "GATO v1.3 IGoldFinger IJumpman IKing's Quest II IDragonwortd IElectronic Arts Software lEn Vacances lEn "Countdown to Shutdown "Coveted Mirror ICreate with Garfield lManagement Edge IMovie Monster Game IMultiScribe v3.0 Ville IFantavision gs IFight Night IForbidden Castle IG.I. Joe IDaisy Professional IDestroyer lDonkey Kong IExpedition INegotiation Edge INightmare Gallery "Patchworks IPicture IGarfield Double Dares IGeneral Manager IGoonies Amazon IGenerai Chemistry Disk #8 IGraphics Studio IGreen Phonics IPrintographer IReader's Treasure Chest IReal Math IGraphicWriter 2.0 IGutenberg, Sr. IHacker II IHardbail Globs &Graphic Equations lKalamazoo Teacher's Record Book lSea Strike IShifty Sam "Simulation Construction Kit ISnoopy'S IHardbail gs Iinfiltrator IJames Bond 007: AView to aKill 2.0 IKids on Keys IMarble Madness IMath Blaster lMaxweIl Reading Machine ISnoopy's Skywriter SCrambler ISnoopy to IKeyboard Kadet IKids on Keys I Lazer Maze "Le Manor IPeanut's Maze Marathon IPetr~alc IPoIice Artist the Rescue lSongWriter ISpeIl It! IStickybear Reading Demenagement ILe Francais par Ordinateur: ILeisure Suit IPractical Grammar IRendezvous IRing Quest IRoadwar Comprehension ISuper BoukJerDash • APTs: IBard's Tale Larry in the Land of the Lounge Lizards ILes Sports Ilion's Europa IRoadwar 2a111lJ IRocky Horror Show lSesame Street III ISuper BoulderDash IUltima V • Playing Tips: IAlternate Workshop IMicrozine #21 IMicrozine #22 'Milliken Word Electric Coloring Book Series lSesame Street Letters for You Reality IAuto Duel "Ultima V"Where in the World is Carmen Processor IMiliionair II IMultiscribe v2,0 IMultiscribe v3.0 "Sesame Street Numbers lSeven Cities of Gold ISnoopy's Sandiego IBM Softkey: "Chartmaster v6.04 "Clout v1.0 IMultiscribe IIgs v3.01c IParis En Metro IPitfail II "Racter Reading Machine ISpy's Adventures In Europe ISpy's Demise lCopywrit IGraphwriter ISignmaster vS,04 IRailroad Works IRambo: First Blood Part II IRealm of ISuper Sunday Football ITaiisman ITellstar II ITop Draw Impossibility lSame or Different lSea Dragon lSea Strike v1.01A IThe American Challenge IThe Dam Busters IThe 58 19118 • Features: lMixing ProDOS with Thexder IShanghai IShowOff IShutterbug "Silent Service IIgs "Snoopy SCience Professor ITubeway 'Vocabulary Adventure IIWinter Iinlocom Decoder Revisited ICracking on the lie IMight &Magic to the Rescue ISnoopy'S Reading Machine ISnoopy'S Skywriter Games IWizards' Crown lZero-Gravity Pinball • APTs: Revisited IMight &Magic Character Editor IAn indepth guide SCrambler ISpace Quest IISpace Station ISpy Hunter ISpy's IExpedition Amazon IMight and Magic • Playing TIfJS: to Uttima IV lComputing for 1-3 year oIds IThe Product Monitor Adventures in Europe ISpy's Adventures in North America lBeauracracy IKing's Quest II ILurking Horror IManiac • Sohkeys: IA.I. lBoukJerDash IBoulderDash Construction lS1ephen King: The Mist IStory Maker IStreet Sports BasketbaH Mansion "S1ationfall ffiM Feature: Iintroduction to IBM Disk Set lDeathSword lDesign Your Own Home: Architecture ISub Battle Simulator ISuper Sunday Football ITalking Text Format, Access, and Copy·protection IPutting Sargon III on lDesign Your Own Horne: Interior lDesign Your Own Home: Writer IType! IUn Repes Francais IVoodoo Island IWhere in harddisk ffiM Sohkeys: IProkey 3.0 IR:base 400 I TIme Landscape IFacemaker "Gauntlet IKings Quest II IMastery Europe is Carmen Sandiego IWinnie the Pooh "Winter Games Manager Arithmetic IMicrozine #26 'Muppet Slate v1.0 IPFS: Graph IWinter Games gs IWordzzzearch IWorld Games gs • APTs: IPoIywriter 1.2 lRad Warrior IRings of lilfin lSeaspeller "Smart 12400 AD IKung-Fu Master ILady Tut "Ultima V • Playing 53 March 1988 • Features: IModify Super lOB to Eyes ISpeIlIt! IWings of Fury • APTs: ICastie Wolfenstein Tips: 12400 AD lDeathlord 'Space Quest "Ultima IV "Ultima readlwrite every other track I APT for Rings Of Zilfin: Turn IMarble Madness IIgs IMight &Magic "Ultima IV IUltima V V"Wrath of Denethenor ffiM Softkeys "Exaco-VlSion IMS Word yoursell into alean, mean fighting Machine I More Softkeys for • Playing TIfJS: lCoveted Mirror lDeathlord IMight &Magic lPe-Draw "Zork I &II • Notes: INot too happy with Copy M,E.C.C, software ( 1987) IHow To Use The Electronic Art's ICJo.Topos"UltimaN .Notes: IA better way to print S1arter II Plus vS.1 IData disks cause Appleworks crash RWlS IAPT for Realms Of Darkness: Realm's Wrecker!

38 COMPUTIST #61 Novembel' I 1 ~OMPUTIST ba~k issues To order, Use the back issue order form on page 42

tPutting Super Boulder Dash onto ahard disk _ Sohkeys: -Flight Simulator tpFS Report ffiM APTs: -Bard's Tale t2400 A.D. tAge Of Adventure -Apple's Core IItArcade Boot 49 November 1987 Fea/ures: -Eliminate some Camp tArctic Fox tAztec tBallblazer tBard's Tale IIgs tBlue 5 1 January 1988 Fea/ures: -The Crypt-arithmetic ProDOS erroneous error messages tDate/time without aclock Powder Gray Smoke tCalifornia Games tChampionship Helper -Using EDD IV to Modify Tracks And Sectors tBard's card -Sector surgery: recover lost files -Generating Applesoft Wrestling tColonial Conquest tComprehension Skills I,ll Tale APT: Dungeon Mapper Revis~ed -RAMlactor mod for Laser programs 'on·the-fly' -Product Monitor reviews 'PLUS: How tConquering Whole Numbers tCoordinate Math -Countdown 128 -Ultima IV APT edit·tables -The Product Monitor -Get Better to convert List Handler files into standard text files -How to make To Shutdown tDataquesl: The Wo~d Community tDestroyer Sound by using the cassette jacks -Making AFast Boot Disk GRAPHIC.GRABBERv3 run on the IIgs -Laser 128 'absolute' -Dream House tDream Zone -Earth Orbit Station tEquation -Might &Magic APT ed~·tables Sohkeys: -2400 AD -Aliens RESET Playing Tips: -Bard's Tale II -Conan -Donkey Kong Math tForecast: Your At·Home Weather Station tFraction -Alphabet Zoo -Amnesia -Bag Of Tricks -Bard's Tale I-Bard's -Hacker I -Hard Hat Mack -Orbitron -Print Shop Companion Concepts Inc tFraction Munchers tFraction Practice Unlimited Tale II-Battle Cruiser -Beach·head II-Below The Root -Black -Spellbreaker -Spy Hunter -Ultima 4A.P. T.s: Infiltrator tlode tGBA Championship Basketball-Genesis -GFL FootbaIltGhost Magic -Body Awareness -Bridge 4.0 -Carriers At War tCataIyst Runner -Montezuma's Revenge -Swordthrust series Sohkeys: Rider tGoonies tGrade Manager v2.3 tGreat American Cross­ 3.0 -Centipede -Championship Boxing -Championship -Addition logician -Animate -Arcade Boot Camp -Arctic Fox country Road Race tHardballllgs tlkari Warrior tJenny's Wrestling -Chessmaster 2(/)(/)(/) -Combining The Elements -Bard's Tale II-Cal'n Mouse -Counting Critters -Dam Busters Journeys tKid Niki Radical Ninja tKung-Fu Master tlearning -Commando -Creative Contraptions tEinstein Compiler -Fat t tDestroyer -Draw Plus v1.0 -Dr. Ruth's Comp. Game Of Good To Tell Time -leisure Suit larry tlet's learn About Money City -Fight Night tFlight Simulator v2.0 -Fun with Direction Sex -Echo 1.0 -E.D.D. 4-Gamemaker -Hard Ball-Infiltrator tLet's Learn About The Ubrary tletters For You tlords Of -GBA 2.{)n-2 Championship BasketballtGraphicWriter vl.1 RA -List Handler t tlocksm~h 6.0 Fastcopy t -Magic Slate -Math Conquest tMagic Spells -Math Blaster tMoney Works tMaps -Growing Up Small -House-on·a-disk -Intrigue -Jet -Jungle Critters -Millionaire -Mind Mirror -One On One -Paintworks &Globes: latitude &longitude tMarble Madness tMicrozine Hunt tKindercomp tKnowing Numbers -Kung·fu Master -law Plusv1.0 -Paintworks Plus vI.I -PHM Pegasus -Portal 18,19,20,21,22,23 -Mist -Morning Star Math -Movie Monster Of The West tLearning Well series tletters And Words -Little -Quotient Quest -Reader Rabbit -Saunder's Chemistry CAl Game tMultiplication Puzzles tMultiscribe v3.Oc tMurder On Computer People tMake Your Own Murder Party -Manic -Science Toolkit -Shanghai -Strip Poker t -Super Bunny The Mississippi tMusic Made Easy tMystery Sentences Mansion -Master Diagnostics -Movie Maker tMusic tSuper Sunday -Swordthrust series t tTerm Paper Wmer -Thief tNumber Munchers tNumbers Count tOdel1 Lake tOperation Construction Set -Pinball Construction Set tPitstop -Print Shop -Top Fuel Eliminator -Typing! t -Upon-Down tWil1y Byte Frog tOpposites Attract tQregon Trail v1.4 tPhonics Prime Graphics Library Holiday -Print Shop IIgs -Rendezvous -Writer's Choice Elite vl.0 tWriting ACharacter Sketch -Writing Time: Blends &Digraphs tPhonics Prime Time: Vowels I, II -Shapes And Patterns -Silent Service -Sorcerer -Spy vs Spy ANarative -Puzzles &Posters tQuotient Quest tReader Rabbit tReading 1& II tStargate -Stellar 7-Stickybear ABCs -Stickybear Drawing Style Inventory tRealm Of Impossibility tSesame Street 'Crayon' -Stickybear Numbers -Stickybear Printer -Stickybear Printer 48

I November COMPUTIST #61 39 I £OMPUTIST back issues To order, Use the back issue order form on page 42 oFlight Simulator Update oRaid over Moscow oCrime Stopper Slate oAlter Ego oRendezvous oQuicken oStory Tree oAssembly Editor -Core: -Fingerprint Plus: AReview -Beneath Beyond oKey Perfect 5. oThe Final Conflict oMiss Mouse oSnoggle Language Tutor oAvalon Hill games -Dark Crystal Features Castle Wolfenstein (part 2) Features oWrite Protecting the Microsoft RAM Card oKeys to oPlaying Karateka on aIIc oTrack Finder -Sylk to Dil Core: Success on the Franklin Ace oModified F8 ROMs on the Apple oBreaking In: tips for beginners -Copy ][ Plus 6.0: areview -The 27 January 1986 Bohkeys -Microzines 1·5 III Core oOwner's Review of Copy Master II DOS Alterer -Microzines 7-9 IMicrozines (alternate method) ophi Beta Filer -Sword of Kadash -Another Miner 204ger oLearning With 44 June 1987 SoRkeys: -Arcade Boot Camp 36 October 1986 Sohkeys: -Flight Simulator II v Fuzzywomp -Bookends oApple Logo II oMurder on the oGoonies -Zorro oCoveted Mirror oCrimson Crown 1.05 oAutoDuel -Critical Reading -Troll's Tale -Robot War Zinderneuf -Features -Daleks: Exploring Artificial Intelligence oCompubridge 0 Fleet System 30 Microwave -Escape oCatalyst oGeneral Manager -Plasmania -Telarium Software -Kidwriter oMaking 32K or 16K Slave Disks oCore: -The Games of 1985: 3.0 oNumber Farm oAlphabet Circus oJoe Theisman's Pro v1.0 -Color Me Features -ScreenWriter meets Flashcard -The part II Football -Black Cauldron olntern, Gran Prix Features -Making Bus Monitor oMousepaint for non·Apples Core: -The Bard's DOSless Utilities opixit Printer Drivers Review.' Z·RAM Memory Dressing Room APT -Championship Lode Runner 26 BoRkeys -Cannonball Blitz -Instant Recall Expansion Board oReading the Joystick -Gessler Spanish Software -More Stickybears -Financial 3S September 1986 Bohkeys: -Olympic Decathlon Cookbook -Super Zaxxon -Wizardry -Preschool Fun oHo~ Grail 43 May 1987 BoRkeys: -Graphics Expander -Hi·res Cribbage -Revisiting F·15 Strike Eagle -Masquerade -Inca -128K laxxon -Feature -ProEdit -Core: -Games of 1985 olnformation Master oCertificate Maker oElite oCatalyst 2,0 and -The Hobbit -Pooyan -The Perfect Score -Alice in Wonde~and part I 3.0 -Murder On The Mississippi -Temple Of Apshai Trilogy -The Money Manager -Good Thinking -Rescue Raiders -Troll Associates programs oSpell1t oRegatta -Cdex Training Feature: Pulling a New F8 on Your Language Card Core: 2S Sohkeys -DB Master 4.2 oBusiness Writer programs -Think Fast Features oHow to Write-Protect your Slot oExploring ProDOS by installng aCPS Clock Driver -Barron's Computer SAT -Take 1-Bank Street Speller oWhere Zero oCapturing Locksmith 6.0 Fast Copy oRevisiting DOS to In The World Is Carmen Sandiego -Bank Street Writer 128K ProDOS and Back Core -Computer Eyes 12: aReview APTs 34 August 1986 Sohkeys -Crisis Mountain -Terripin -Word Challenge oSpy's Demise oMind Prober -BC's Quest oSword of Kadash &Rescue Raiders -Ultimaker IV Logo -Apple Logo II -Fishies 1.0 -SpeliWorks -Gumball For Tires -Ea~y Games -Homeword Speller oFeature oAdding -Rescue at Bigel-Crazey Mazey -Conan oPerry Mason: The IF THEN ELSE To AppIesoft oCore: -DOS To ProOOS And Back 42 Aprill987 BoRkeys;tlight Simulator oBeach. Case olthe Mandarin Murder -Koronis Rift Feature: -More ROM Head -Monty Plays Scrabble oRacter oWinnie the Pooh Running Core: -Infocom Revealed 24 Bohkeys oElectronic Arts software -Grolier olnfocom Stuff, Kabul Spy, Prisoner II-Wizardry 1&2-Lucifer's software -Xyphus -F·15 Strike Eagle -Injured Engine oMr. Robot BoRkeys-Word Juggler-Tink! Tonk! Realm -The PFS Series -Dollars and sense 0 Strip Poker 33 July 1986 And His Robot Factory -Applecillin II-Alphabet Zoo oFathoms 0 -Sundog v2,0 -G.I. Joe Lucas Film's Eidolon -Summer oCoveted Mirror oWizard's Crown The Swordthrust Series & 40 -Story Maker -Early Games Matchmaker oRobots Of Dawn oAxis Assassin oManuscript Manager -The Crown of Arthain Games II -Thief -Instant Pascal -World's Greatest Football -Feature -Essential Data Duplicator copy parrns oCore: -OOS­ oAddress Book oDecimals 3,0 oDragonfire Features oAuto Duel Game -Graphic Adventure #1 -Sensible Grammar &Extended Direct Sector Access Editor -Wizard's Crown Editor -Questron Mapper Core: -The Bookends -Chipwils -Hardball -King's Quest II -The World's Games of 1986 in Review Adventure Tips oUltima IV Greatest Baseball Game Feature: -How to be the Sound Master 23 Bohkeys oChoplifter -Mufplot oFlashcalc Core: -The Mapping of Ultima IV -Karateka -Newsroom -E·Z Draw oGato oDino Eggs -Pinball 41 Marcil 1987 BoRkeys: -The Periodic Table June 1986 Bottkeys -Revisiting Music Construction Set -TAC -The Print Shop: Graphics Library oGemstone Warrior olnferno oFrogger -Story Maker -Adventure 32 -Death In The Caribbean oFeatures oUsing A.R.D. To Softkey 0 Construction Set -Cubit -Baudville Software -Hartley Software Writer oMummy's Curse oZaxxon The Quest -Pitfall II Mars Cars -How To Be The Writemaster oCore: oWheel Of oH,E.A.O. Features -A Two-Drive Patch for Winter Games -Bridge oEarly Games for Young Children -Tawala's Last Money oCustomizing the Speed of aDuodisk -Roll the Presses Part Redoubt -Print Shop Companion -Kracking Vol II oMoebius -Mouse Budget, Mouse Word & Mouse Desk -Adventure Two: Printshop Printer Drivers oThe Games of 1986 Sohkeys -Miner 204ger -Lode Runner -A2·PB1 Construction Set Feature: -Using Data Disks With Microzines 22 February 1987 SohkeW°AdveniureWriteroE-Z Pinball-The Heist-Old Ironsides -Grandma's House oln Search 40 Core: -Super lOB v1.5 aReprint -Mo~oc's Learner oMychess II oRaster Blaster oCranston Manor of the Most Amazing Thing Tower oMarauder -Sargon oGhostbusters oDesigner's Pencil oThe American Challenge 3 1 May 1986 Sohkeys -Trivia Fever -The Original III -Features -Customized Drive Speed Control oSuper lOB -Encyclopedia Britannica Programs oCrime Wave Features Boston Computer Diet -Lifesaver -Synergistic Software -Blazing version 1.5 -Core: -The Macro System oTaking the Wiz out of Wizardry -Adding aPrinter Card Driver Paddles -Zardax -Time Zone -Tycoon -Earthly Delights -Jingle to Newsroom Core: Games of 1986 Disk -Crystal Caverns -Karate Champ Feature: -A Little Help 20 Bohkeys -Sargon III-Wizardry: Proving Grounds With The Bard's Tale Core: -Black Box -Unrestricted of the Mad Overlord and Knight of Diamonds 0 The Report Card 39 January 1987 Sohkeys:oMIDII8+ oHomeword Ampersand V1.1 -Kidwriter -Feature -Apple II Boot ROM Disassembly v2.1 oBorrowed Time oAmazon oSpeed Reader][ oDiscovery! -Core: -The Graphic Grabber v3.0 oCopy II + 5.0: AReview oM-ss-ng L-nks series oDonald Ducks's Playground -Mastering 30 Aprill986 BoRkeys -Millionaire -SSl's RDOS -The Know·Drive: A Hardware Evaluation oAn Improved the SAT oCopy][ Plus 4.4C oMaster of the Lamps "One on One -Fantavision -Spy vs. Spy -Dragonworld -King's Quest BASIC/Binary Combo oBridge Baron oA.E. oGreat American Cross-COuntry Road Race oMastering the SAT -Easy as ABC oSpace Shuttle -The Factory oComputer Preparation for the SAT oCastie Wolfenstein -Visidex 1.1E -Sherlock Holmes -The Bards Tale -Feature 19 Bohkeys -Rendezvous Wilh Rama -Peachtree's oLuscher Profile oSkyfox -Silent Service -Echo Plus -Increasing Your Disk Capacity -Core: -Ultimaker IV, an Ultima Back To Basics Accounting System oHSD Statistics series oSwashbuckler oRandamn Features oElectronic Disk Drive IV Character Editor -Arithmetickle -Arithmekicks and Early Games for Children Swapper oAbusing the Epilogues -Print Shop Companion's -Features oDouble Your ROM Space -Towards a Better F8 Driver Game Core: oKeyboard Repair oFixing the Applesoft 29 March 1986 Bohkeys -Threshold -Checkers ROM -The Nibbler: AUtility Program to Examine Raw Nibbles sample Disk v2.1 -Microtype oGen. &Organic Chemistry Series -Uptown From Disk -Core: -The Games of 1984: In Review·part II Trivia -Murder by the Dozen oWindham's Classics -Batter Up 38 December 1986 Bohkeys: -Cyclod -Alternate oEvelyn Wood's Dynamic Reader -Jenny of the Prairie -Learn 16 SohkejS -sensible Speller tor ProDOS oSideways Realty oBoulder Dash I &II oHard Hat Mack (Revisited) oThe About Sounds in Reading -Winter Games -Feature -Rescue Raiders -Sheila -Basic Building Blocks -Artsci Other Side of·15 Strike Eagle -Championship Lode Runner oCustomizing the Monitor by Adding 65C02 Disassembly -Core: Programs -Crossfire -Feature -Secret Weapon: RAMcard oGato V1.3 01, Damiano oWilderness -Golt's Best Features: oThe Animator -Core: -The Controller Writer -A Fix For The Beyond Castle oThe Enhancedl Unenhanced lie oLooking into Flight Wollenstein Softkey -The Lone Catalog Arranger Part 1 Simulator's DOS Core: oAppavarex olnstalling aRAM disk into 28 February 1986 Bohkeys -Ultima IV oRobot DOS 3.3 Odyssey -Rendezvous -Word Attack &Classmate -Three from 1 Bohkeys -Data Reporter -Multiplan -Zork oFeatures Mindscape -Alphabetic Keyboarding -Hacker -Disk Director -PARMS for Copy II Plus -No More Bugs -APT's for Choplifter 37 November 1986 Sohkeys: -Under Rre oPegasus oLode Runner -MIDI/4 -Algebra series -Time is Money -Pitstop &Cannonball Blitz -'Copycard' Reviews -Replay oCrackshot ][ oTake 1(revisited) oFlight Simulator II v1.05 (part 2) oMagic II-Apventure to Atlantis -Feature -Capturing the Hidden Archon -Snapshot -Wildcard

I 40 COMPUTIST #61 November I • ••IO••IU••lt.I-.IO••lf••1!rJ!!W!!;!:~f Issues Due to popular demand, these sold-out issues are available now as •zeroxed, copies, full-sized and center stapled.

21 .Softkeys: -DB Master version 4+ -Dazzle Draw -Archon 10 .Softkeys: -Arcade Machine -Bank Street Writer -Minit Man -Twerps -.Readers' Softkeys: -Advanced Blackjack -Megaworks -Summer .Reader's Softkeys -Senible Speller IV -EDD IV -*KrelilOGO -Canyon Games -College Entrance Exam Prep -Applewriter revisited .Features: Climber .Features: -The Controller Saver -Examining Protected Applesoft -Demystifying The Quarter Track.Core: -Proshadow: AProDOS Disk BASIC Programs -Crunch list II • Core: -Applear . Voice Aynthesis Monitor -Introducing the 65SC802 and 65SC816 Chips -Review· Dino Eggs .Adventure Tips: - -Zork I-Planetfall -Mission Asteroid -Time Zone -Suspended -Critical Mass -Zork II -Castle Wolfenstein 1 B .Softkeys: -Scholastic Version of Bank Street Writer -Applewriter lie -SSl's Non·RDOS Disks • Readers ' Softkeys: -BPI Accounting Programs and DesignWare Programs .Features: -Installing 9 .Softkeys: -Sensible Speller -Sierra·On·line Software -The Visible a Free Sector Patch Into Applewriter lie -Simple Copy Protection. Core: Computer: 6502 .Reader's Softkeys: -Visidex -Music Construction Set -The Games of 1984: In Review -65C02 Chips Now Available -Checksoft -Gold Rush -Visiterm -Cosmic Combat • Features: -Super lOB v2 .Adventure Tips: -Pirate Adventure -Mask of the Sun -Colossal Caves -Transylvania -Death in the Caribbean -Zork II • Core: -Word Search Generator -ProDOS to DOS -ProDOS on a Franklin Ace 1 7 .Softkeys: -The Print Shop -Crossword Magic -The Standing Stones -Beer Run -Skyfox -and Random House Disks • Features: -A Tutorial For Disk Inspection and the Use Of Super lOB -S·C Macro Assembler B .Softkeys: -Robotron -legacy of lIylgamyn -The Artist -Data Directives (reprint) • Core: -The Graphic Grabber For The Print Shop -The Factory v5.0 - EDD IV .Reader's Softkeys: -Spy Strikes Back -Hayden lone Catalog Arranger Part Two Software -Apple lOGO .Features: -Review of the Bit Copiers .Core: -COREfiler -ProDOS Data Encryptor .Adventure Tips: -Ulysses and The Golden Fleece -Serpentine -Ultima II -Castle Wolfenstein -Death in the Caribbean -Zork I-Zork II -Gruds in Space -Enchanter -Infidel -Serpent's 15 .Softkeys: -Mastertype -Stickybear BOP -Tic Tac Show Star • Whiz Kid: -How Data is Stored on Disk .Reader's Softkeys: -The Financial Cookbook -Escape from Rungistan -Alien Munchies -Millionaire -Plato .Features: -MREAD/MWRT Update • Core: -A Boot from Drive 2 -DB Master's Data Compression Techniques 7 .Softkeys: -Zaxxon -Mask of the Sun -Crush -Crumble GChomp • Whiz Kid: -DOS and the Drive· Part One .Adventure Tips: -Time -Snake Byte -DB Master -Mouskattack .Features: -Making liberated Zone -Mission Asteroid -Enchanter -Zork I -Ultima - Ultima II -Death Backups That Retain Their Copy Protection -S·C Assembler: Review -Disk in the Caribbean -Gruds in Space -Zork III -Starcross Directory Designer .Core: -COREfiler: Part I -Upper G lower Case Output for Zork

14 .Features: -Super lOB v1.2 Update -Putting locksmith 5.0 Fast Copy Into a Normal Binary File -Batman Decoder Ring -A fix for & .Softkeys: -Pandora's Box -Donkey Kong -Caverns of Freitag DiskEdit .Softkeys: -Seadragon -Rocky's Boots -Knoware -PFS Software -Visifile .Features: -Program Enhancements: Quick.Bug -Personalizing -Computer Preparation SAT -MatheMagic .Review: -Boulder Dash A Program -Modified ROMs .Review -Essential Data Duplicator -The CIA .Core: -Data Bases

13 .Softkeys: -laf Pak -Beyond Castle Wolfenstein -Transylvania -The Quest -Electronic Arts -Snooper Troops (Case 2) -DlM 5 .Softkeys: -Homeword -Aztec -tBag of Tricks -Egbert II Software -learning With leeper -TeliStar .Core: -CSaver: The Advanced -Starcross -Hard Hat Mack -The Home Accountant .Reader's Softkeys: Way to Store Super lOB Controllers -Adding New Commands to DOS 3.3 -Dark Crystal -Screenwriter II -Visifile -lancaster -Bill Budge's Triolgy -Fixing ProDOS 1.0.1 BSAVE Bug .Review: -Enhancing Your Apple of Games - -Amper·Magic -Buzzard Bait .Feature: .Feature: -locksmith 5.0 and locksmith Programming language. -Getting on the Right Track

12 .Softkeys: -Zoom Graphix -Flip Out -lion's Share -Music 4 .Features: Ultima II Character Editor .Softkeys: -Ultima II Construction Set .Reader's Softkeys: -Hi·Res Computer Golf II -Suicide -Witness -Prisoner II -Pest Patrol .Adventure Tips: -Ultima II G III -Sabatage -Millionaire -Time is Money -Type Attack .Features:Pseudo­ .Copy II Plus Parms Update ROMs on the Franklin Ace .Core: -Psychedelic Symphony -The CORE Disk Searcher -The Armonitor .Adventure Tips: -Cranston Manor ­ Enchanter -Kabul Spy -Colossal Caves -The Witness -Pirate Adventure 3 .Softkeys: -Bag of Tricks -Multiplan • Readers ' Softkeys: -Ultima III-Exodus -Adventureland -Visiplot Nisitrend -Sneakers -Wizardry .Features -No More Bugs: The Sequel -Hidden locations Revealed -Map Maker .A.P.T.s -Choplifter .Adventure Tips -Cranston Manor -Strange Odyssey 11 .Softkeys: -Sensible Speller -Exodus: Ultima III • Readers , Softkeys: - -The Einstein Compiler v5.3 -Mask of The Sun .Features: -Copy II Plus v4.4C: Update Of An Old Friend -Parameter 2 .Softkeys: -Magic Window II -Multiplan .Features: -Parameters list For Essential Data Duplicator .Core: -U1timaker III -The Mapping for locksmith 4.1 -Page Flipper -String Plotter -Three·D Wall Draw of Ultima III -Ultima 1I ...The Rest Of The Picture • Core: Checksums .Input: -Reviews of unprotected commercial software

November COMPUTIST #61 41 ~------, Sad /fIm i6IIII& uJ./eJt ~ 4iW: laue lag Disk IlcIth $4.75 $9.95 $12.95 COIVIPUTIST 60. ·· · ···· ·· · 0 0 0 &9. ·· ··· ···· · 0 0 0 &B. ·· ····· ·· · 0 0 0 back issues and library disks are &7. ·· ···· ·· · 0 0 0 &6. ··· 0 0 0 &&. ·· ···· · · 0 0 0 frequently referenced in current issues. &4. ·· ···· ·· · · 0 0 0 &3. ·· ····· ·· · 0 0 0 &2. ·· ····· ·· · 0 0 0 Ba{.'k Issues and Lillrar~ Disk Rates I &'1.. · · ······ · · 0 0 0 I ····· · ·· · · I &0. · · ····· · · · 0 0 0 • US, Canada and Mexico back issue rate - $4.75 each. 49_ · · ······ · · 0 0 0 • All other Foreign back issue rate - $8.75 each. 4B. · · ····· ·· · 0 0 0 47. ·· -- ·· - ·· · 0 0 0 • US, Canada, Mexico library disk rate - $9.95 each. 46. ·· - · · · ··· · 0 0 0 4&. - · --- ···· · 0 0 0 • All other Foreign library disk rate - $11.94 each. 44. ·· · ···· - -· 0 0 0 43_ - · · -- ···· · 0 0 0 • "Both" disk and magazine rates for: 42. ·· ·· ···· · · 0 0 0 US, Canada & Mexico - $12.95 each combination. 4'1.. · · · · ····· - 0 0 0 All other Foreign - $18.95 each combination. 40. -- · · - ···· · 0 0 0 39. -- · ······ · 0 0 0 3B. ·· ·· - ···· - 0 0 0 37. ·· -······ · 0 0 0 WIud i3 a ~ dhk? 36. ·· ··· · · · · · 0 0 0 3&. ·· ···· ·· · · 0 0 0 A library disk is a diskette that contains programs that would normally have to be typed in by 34. -- 0 0 0 the user. Documentation for each library disk can be found in the corresponding issue. 33. ·· · · ·· · · 0 0 0 32. ·· ···· · · · · 0 0 0 -Library disks are available for all issues ofCOMPUTIST # I thru 61. Ifyou wish to purchase ·· ·· -- ·· ·· a library disk not listed on the left (under the DISK column), used the out-of-print back issues 3'1.. ·· ·· · - ··· · 0 0 0 30. ·· -· · ····· 0 0 0 ad on page 42. 29. ·· ·· ····· - 0 0 0 *2B. ·· ···· -- 0 0 0 27. ·· ··· · -- · · 0 0 0 26. ·· -- · ···· · 0 0 0 2&. ·· ··· · - ·· · 0 0 0 24. · · ····· - · · 0 0 0 *23. - 0 0 0 COHE 3 Games: Constructing Your Own Joystick- Compiling Games- GAME REVIEWS: 22. ·· · ···· 0 0 0 .2'1.··_ · - ···· · · Over 30 of the latest and best- Pick Of The Pack: All-time TOP 20 games- Destructive Forces- EAMON- Graphics Magician ······· - 0 0 0 and GraFORTH- Dragon Dungeon...... 20. ·· ···· · - · · 0 0 0 * '1.9. ···· · ··· 0 0 0 • 'I.B • ···· 0 0 0 COR.E 2 Utilites: Dynamic Menu- High Res: Scroll Demo- GOTO label: Replace- Line ··· - 0 0 0 Find- Quick Copy: Copy- . •* '1.6_'1.7. - ·· ···· · 0 0 0 - ····· ·· 0 • '1.&. ···· · - ·· 0 0 • '1.4_ ···· -·· · 0 0 0 COR.E 1 Graphics: Memory Map- Text Graphics: Marquee- Boxes- Jagged Scroller- low • '1.3. ··· · - ··· 0 0 0 Res: Color Character Chart- High Res: Screen Cruncher- The UFO Factory- Color- Vector Graphics:Shimmering Shapes- • '1.2. · - ·· ·· ·· 0 0 0 A Shape Table Mini-Editor- Block Graphics: Arcade Quality Graphics for BASIC Programmers- Animation . • 'I. 'I. • 0 0 0 ··· · ···· 0 0 • '1.0. · -- ··· -- 0 .9. · · ···· · ·· 0 0 0 .B. · ····· ·· - 0 0 .7. - 0 D 0 Core·3.···· ·· · 0 0 0 Name 10# _ .6. · ·· ·· · 0 0 0 · ······" ·· Address _ .S. · ······ ·· 0 • • .4. · · ·· · · ··· 0 0 .3. · ·· ·· ···· 0 0 City State Zip Core Z. · · · ·· · 0 00 .Z. · ······ · · 0 0 Country Phone _ '1 • . ·· ···· ··· · 0 0 Core '1. ····· · 0 00 alE • Exp. Belt of IIardc:ore Comp1ItlDg •• 0 Only the dlllk Is BYlnlble • • Signature CP61 Core Spec:IaI Combo $10 •... " 0 (All th,," CORE IIlIglZln..: no dllklj • • • US funds drawn on US bank. • Most orders shipped within 5 working days, however please allow up Some disks apply to more than one issue and lII8 shown as taller boxes. to 4 weeks delivery for some orders.• Most orders shipped UPS, so please use street addresS.• Offer Special "Ilolh" diSk &magazine combination orders apply to one issue good while supply lasts.• In Washington state, add 7.8% sales tax.•Send check/money order to: and its corresponding disk. * Limited supply; first-com&-first-serve basis. COMPUTIST PO Box 110846-T Tacoma, WA 98411 (206) 474-5750 • Not available. o Out-or·print; only 'Zeroxed' copies for sale.

I~------~42 COMPUTIST #&1 November I r------.,I ' I • • • I I I I I I Software Package I I e I I gs Software Package I e II gs I I 816 Paint $45.(/)0 0 $45.(/)0 0 Multiscribe 3.0 .. , $48.(/)0 0 $66.(/)0 0 COMPUTIST I I Alternate Reality: The Dungeon...... $28.(/)0 0 ~~~~r:dio .2.([)...... $$35~:: B is proud to I I Alternate Reality: The City...... $20.(/)0 0 I I Appleworks , $190.(/)0 0 Paint Write Draw.. $120.(/)0 0 offer these I I Artic Fox ,...... $28.(/)0 0 Paintworks Plus...... $47.(/)0 0 LOW f I I Bank Street Writer 64K...... $46.(/)0 0 Paintworks Gold...... $65.(/)0 0 SO tware I II Bank Street Writer Plus (128K) $46.(/)0 0 Pegasus , $23.(/)0 0 prices * for II Bard's Tale...... $30.(/)0 0 $35.(/)0 0 The Print Shop...... $34.(/)0 0 $40.(/)0 0 I Bard's Tale II , $35.(/)0 0 Print Shop Companion $27.(/)0 0 Apple /I and I I Bard's Tale ill ,...... $35.(/)0 0 Print Shop Graphics Library: I I California Games...... $26.(/)0 0 $26.(/)0 0 Disk One , $16.500 IIgs software I I Certificate Maker...... $25.(/)0 0 Disk Two. ,...... $16.50 0 I I Championship Karate...... $14.(/)0 0 Disk Three...... $16.500 I I Chessmaster 2(1)(/)fD...... $28.(/)0 0 Pro-Byler. ,,,.... $32.(/)0 0 I I Clip Art Library (for Paintworks Plus). . $20.(/)0 0 Reader Rabbit .. ,...... $27.(/)0 0 $34.(/)0 0 * Prices subject to I I COpy II Plus v8.0...... $23.(/)0 0 $23.(/)0 0 Silent Service...... $23.(/)0 0 change without notice. I I Create with Garfield $20.(/)0 0 Space Quest...... $32.(/)0 0 $32.(/)0 0 Because we do not 'stock' but I I Create wI Garfield Deluxe...... $28.(/)0 0 Space Quest II...... $32.(/)0 0 d I I Crossword Magic...... $32.(/)0 0 Star Fleet ,...... $35.(/)0 0 °t e~8nlY the software needed, I I Dark Lord...... $15.(/)0 0 Star Trek· The Kobayashi Alternative.. $27.(/)0 0 t e MPUTIST Shopper keeps I I Dazzle Draw...... $40.(/)0 0 Star Trek II· The Promethean Prophecy $27.(/)0 0 operating costs to a minimum I I DeathIord...... $28.(/)0 0 Stickybear Series: and can pass the savings on to I I Draw Plus...... $52.(/)0 0 ABC's...... $24.(/)0 0 yOU. I I ~.15taS~e Eagle...... $24:(/)0 0 $40.(/)0 0 :a~ ~ ...... "...... ~4.: B In most cases,your order is I I F1ianhtVl;IO~ .. 'IT' ...... $34.(/)0 0 N~r~ ...... $2::(/)0 0 shipped within two weeks. The I I Fo~e 7~ ...to~ .. :::::::::::::::::: ~i~:: B Reading.'.:'.::'.:',::::'.:'.::::'.:::: $24.(/)0 0 COMPUTIST Shopper will NOT I I Halls of Montezuma...... $28.(/)0 0 $28.(/)0 0 Shapes...... $24.(/)0 0 cash your check nor charge I I Hardball...... $22.(/)0 0 $28.(/)0 0 Typing...... $24.(/)0 0 your cred!t card u"til your I Hitchhiker's Guide $20.(/)0 0 Opposites... $24.(/)0 0 software IS ready to be shipped I Jet...... $29.(/)0 0 Thexder ,...... $23.(/)0 0 $23.(/)0 0 If the software you ordered is I Karateka...... $24.(/)0 0 TimeOut Superfonts $42.(/)0 0 not available, you will have the I King's Quest...... $32.(/)0 0 $32.(/)0 0 Tomahawk.... $23.(/)0 0 option to cancel your order, or I King's Quest II...... $32.(/)0 0 $32.(/)0 0 Topdraw...... $66.(/)0 0 make an alternative selection. I King's Quest ill...... $32.(/)0 0 $32.(/)0 0 Type ...... $30.(/)0 0 I King's Quest IV...... $32.(/)0 0 Typing Tutor IV...... $32.(/)0 0 $32.(/)0 0 How To Order I Knight of Diamonds...... $23.(/)0 0 Ultima V...... $40.(/)0 0 I Legacy of the Ancients...... $28.(/)0 0 Visualizer ,...... $53.(/)0 0 $59.(/)0 0 • US orders: Check the box for I I Legacy of Llylgamyn. ,...... $26.(/)0 0 Where in USA is Carmen San Diego. .. $30.(/)0 0 your selection. For Apple I1gs I I Leisure Sjlit Larry...... $26.(/)0 0 $26.(/)0 0 Where in World is Carmen San Diego. $30.(/)0 0 software, check the box in the I I Lode Runner...... $24.(/)0 0 Where in Europe is Carmen San Diego $30.(/)0 0 right·hand column. I I Macroworks ...... $20.(/)0 0 Wings of Fury...... $25.(/)0 0 • Please add $3 per order for I I Math Blaster...... $28.(/)0 0 Winter Games. $25.(/)0 0 $27.(/)0 0 hi' & I I Math Blaster Plus...... 29.(/)0 D $29.(/)0 0 Wizardy ... .' ...... $32.(/)0 0 $ ppmg handling. Orders over I I Math Rabbit...... $27.(/)0 0 Word Attack...... $28.(/)0 0 200 receive free shipping. I I Math Talk...... $35.(/)0 0 Wordperfect wi Spelling Checker·. .... $95.(/)0 0 $95.(/)0 0 • Most orders shipped UPS, so use I I Marble Madness...... $25.(/)0 0 $25.(/)0 0 World Games...... $25.(/)0 0 $27.(/)0 0 your street address. I Mean 18, Uhimate Golf $28.(/)0 0 Writer's Choice Elite $60.(/)0 0 • Wuhington state, please add I Merlin 8116 $80.(/)0 0 Writer Rabbit. $24.(/)0 0 7.8% sales tax. I Millionaire II...... $40.(/)0 0 Yeager's Advanced Flight Trainer. .... $28.(/)0 0 • Offer good while supplies last. I I Mousewrite ,.... $99.00 0 $99,00 0 • Foreign Orders: Please inquire I as to appropriate shipping fees I I I Name 10# e Software I Address SUBTOTAL ------I e~ I City State Zip SHIPPING I CouIitry ______Phone (see above) I I •• ------eWA residents I I - - - Exp. Sales Tax I I 7.8% I I Signature CP6l I I • TOTAL I I SoftKey Publishing PO Box 110816-T Tacoma WA 98411 Enclosed I I I I I

IL;::;------Jl' COlllPUTlST #81 43 I Reader's Data EXchange

Keep the IBM RDEX going. I would be compiler that generates commented source interested in a DEBUG tutorial, ffiM code from programs), FSDEBUG (an Neal Jhala softswitch or other important locations and excellent replacement for DOS's DEBUG), general machine language tips. various memory mapping programs and, of Softkey for... course, PC TooLSl Test Drive Kevin Dobbins Words words words Accolade Protected files ,I recently met a key programmer from I one ofthe largest game software companies, -----This softkey works for TDCGA.EXE I've been working for a local computer and had an interesting chat. He was on dated 10/26/874:43 PM. It removes all copy dealer for a few months as a support and Vancouver Island for the "Worlds Best protection from the program. We will use training technician. One day, a saleman Fishing". We talked a little about graphics, DEBUG for this. challenged me to list one of his small batch "c" programming, copy-protection, etc. From the DOS prompt: fIles. I used the "TYPE" command and got Anyway, it seems that we have beaten the REN TDCGA.EX! PROGRAM a "File Not Found" error. He laughed and protectors, and there should be virtually NO DEBUG PROGRAM walked away. After some time, I discovered copy protection in a year or so. I hope his clever security lock. In place ofa character Now you're in DEBUG. COMPUTIST changes its format enough to in the fJIename (or extention), he typed "ALT D 7806 L5 survive in those times! KEY" -255. This had the effect of printing He told me that the main problem that the You should see 555657 06lE. Ifnot then a blank in a directory listing. By extending software companies have, is with the people you have a different version. (See note.) this idea, you could make a fJIename extention who openly advertise pirated software for I 7806 31 ce C3 be invisible, or, by using ASCII codes sale. They are diffucult to catch and prosecute, D 7806 L5 126-255, make a disk appear to be garbage and cost companies lots in lost sales. He was when it is really OK. This idea even works You should see 31 C0 C3 06 IE. not concerned with collectors and traders of with sub-directory names. The possibilities software, since most oftheir software would w are limitless! Maybe this is a well-known never have been purchased in the first place. You should see Wr it i ng E080 bytes. security device for file names, however, I He also said that the restrictions ofhaving thought it was interesting. Q to produce their software in 128K versions (ie: Now you're back in DOS. Apple II) held back better graphics. It seems REN PROGRAM TDCGA.IX! Mike Basford that everyone is waiting for memory prices to come back down to Earth, and the NOTE: Ifyour version is different oryou requirements for State ofArt (instead of, State wish to patch the EGA version of MS DOS Copy Protection of Ark) systems will be 30 - 50 MHz TDCGA.EXE, search for the hex string 55 The tide against copy protection is heavy processors, with a minimum of 16 Megabytes 5657961Eandtrychangingitto31 C9C3961E. in the IBM field, with more and more ofRAM. Ifthe operating system ofchoice is It will probably work. magazines recommending people don't buy Unix or similar, programs can quickly be protected software. More companies each ported between any two machines. We will month drop protection, although some ofthe see less differences between computers, as the C J. Blanchard alternatives are pretty strange. best things from each system are ported to all For the remaining copy protected others. I recently acquired an AE PC Transporter software, here are some heavyweight tools of Of course, this will cause even more which is a super addition to my IIgs as it the trade, all ofwhich I have and recommend. pressure for un-protected software, and any allows me to take work home when necessary. The number one tool is from our friends remaining vestiges will quickly be swept All ofthe software that I have tried - DBase at Central Point Software (CPS), the Option away. \ ill, Wordstar, Windows, PC Paint, Prlntshop, Board. This is inserted between the floppy I hope that this generates some replies, Sidekick, Enable and Grand Slam Bridge ­ controller and the drives, and will copy any and maybe we could have a column where we has run without a hitch except Gunship. disk. I have found a couple that gave me a discuss general subjects, much like a BBS in ® Gunship by Microprose runs well hard time, but they fell to Copy II PC, also print? And please keep up the technical, and enough but the highlighted menu bars don't from CPS. By the way, the Option Board will hardware related articles. Even if I don't work for some reason. The copy protection copy most floppy disks, even ifthey am't ffiM actually build them, they provide some insight is well beyond my skill. I have been reading (are you reading this Apple people?) I into the inner workings of my favorite thru the ffiM RDEX to see if someone else sometimes have to recopy track $00 with machines! has solved this problem. The protection seems Copy II Plus. A further feature ofthis amazing to revolve around bad blocks. There are no piece ofhardware, is that it copies MAC disks Playing Tips for... "INT 13" codes in the GS.COM fIle but the (as well as copying files to and from MAC code is self modifying. While I do not - ffiM). It has all sorts of nice utilities such Leisure Suit Larry in the understand 8086 code, running GS.COM as disk editors etc.. with DEBUG and then retracing the code Copy II PC will copy many disks, but it's Land of the Lounge Lizards produces many "INT 13" instructions. best feature is a program called NOGUARD. Sierra On-Line (Thanks to David Alexander and his This will determine the type of protection "Introduction to ffiM Disk Format, Access used, and, in many cases, deprotect it! In order to by-pass the annoying questions and Copy Protection", I refer to it often.) If Other than these, I use several public at the start of Land of the Lounge Lizards, someone has a fix or crack for this program, domain programs obtained from your local type in your age, (lie, ifyou like!), and then I would appreciate hearing from you. BBS. These include CRACKER (a de- answer the first question with ALT-X. [44 COMPUTIST #61 November Reader's Data EXc:haage

Softkey for... XXXX: IB21 i Atlast, I'm starting to recieve some letters. U 8479 let's keep on writing with the latest tips and Print Shop techniques. Some ofthat 3 and 4 year ok! BBS _____---JI Broderbund XXXX: 0479 INT 13 UxJk jor dish A data was really questionable. I'm sure there are I old versions ofpopular programs floating around XXXX:047B MOV BYTE PTR [CD57].02 There are several versions of Print Shop XXXX:0480 DEC BYTE PTR [CD57] but most of us have the latest version ofany around, and I'll tell you how to crack a couple XXXX:0484 JZ 04DB program that we use a lot. of them. A third, more recent, copy is quite This issue marks the first entry in the IBM different, and I'm still working on it! XXXX:0486 MOV CL,l1 <-- XXXX: 0488 MOV AH, 04 UxJk for special nibble track Most Wanted list. If you're having a problem PS.EXE has the first layer ofprotection, XXXX:048A MOV DH,00 backing up a program, tell us so we can add it and when it is removed, the program will run. to the list. However, when the program is run from hard XXXX:048C MOC CH,09 XXXX:048E MOV DL,00 I'd like to put together a FREE Starter Kit disk, PSINIT.OVR has to be cracked too. for us IBM users. Ifyou have any Public Domain Before you start, use DISKCOpy to XXXX:0490 MOV AL,01 XXXX:0492 INT 13 <-­ Software (PDS) that you would like to donate, back-up the disk. Don't work on the original how about sending it to me. No copyrighted disk! Also, since DEBUG won't work with XXXX:0494 CMP AH,00 Do the check XXXX:0497 JNZ 0480 and crash if not there software please. .EXE fIles, rename PS.EXE to PS before you Above all, sendletters telling about any neat start. U CD4BD andnifty things that you have learned. The more RENAME PS.EX! PS you write, the more others will write. We need DOUG PS Start DEBUG XXXX:04BD INT 13 &me old thing to expand these pages and that's the only way se Me CD 13 Search for INT 13 XXXX:04BF CMP AH,00 XXXX:04C2 JNZ 04A5 to do it RDEXed XXXX: 3AC6 These are the Interrupts XXXX:04C4 ADD BX,018B XXXX: 3ADF that I found. XXXX:04C8 MOV CL,05 Send all contributions to: IBM-RDEX editor U 3ACI Unassemble code to check it XXXX:04C8 ES: XXXX:04CB MOV CL,[BX] COMPUTIST XXXX :3AC6 INT 13 Test for disk XXXX:04CD CMP AL,41 PO Box 110846-T XXXX:3AC8 MOV BYTE PTR [0A91J,02 XXXX:04CF JNZ 04DB Tacoma, WA 98411 XXXX:3ACD DEC BYTE PTR [0A91] XXXX:04Dl INC BX XXXX:3ADI JZ 3AE6 XXXX:04D2 DEC CL XXXX: 3AD3 MOV DH, 00 c XXXX:04D4 JNZ 04CA XXXX:3AD5 MOV DL,00 XXXX:04C6 MOV AX,0000 If check is OK XXXX: 3AD7 MOV CH, 09 UxJk jor special nibble track XXXX:04D9 JMP 04DE Jump to start XXXX:3AD9 MOV CL,0A XXXX:3ADB MOV AL,01 A 1479 MOST XXXX:3ADD MOV AH,04 XXXX:I479 NOP Remove Interrupt 13 XXXX:3ADF INT 13 c XXXX:147A NOP XXXX: 3AE 1 CMP AH, 00 Compare, and crash if not there XXXX:I47B XXXX:3AE4 JNZ 3ACD WANTED A 1491 A3AC6 XXXX:I491MOV AR,n required by An register So:ftkeys XXXX:3ACI NOP Get rid of disk check XXXX:1492 NOP XXXX:3AC7 NOP XXXX:I493 NOP Remove Interrupt 13 XXXX:3ACI XXXX:1494 Gump Microprose A 3ADD actual test of disk AI4BD XXXX:3ADD MOV AR,n required by An register XXXX:14BD "liP I4D6 Jump past check to stan xxxx:3ADr NOP XXXX:3Al1 NOP Get rid of disk check XXXX:14BI' XXXX:3AI1 (On the second copy of PS I looked at, there was a second copy of this code at W Write changes to disk I~DD, IAF6 and IB21. If you have this, Q Quit DEBUG simply repeat above modifications, with the RENAME PS PS.ZAP Rename program to run appropriate address changes.) Print Shop will now run on a floppy. One further modification is optional. The p~og~am will still ask you to put the original Part 2 for hard disk users disk In A:, although it doesn't check. You may use PCTOOLS, or simular, to search for DOUG PSDlIT.OVR DEBUG copy of program this message, and remove it. Leave the "Press SI 2He CD 13 Wok for Interrupt 13 's any key" message in though, or the user XXXX:0479 won't know why the program is just sitting XXXX:0492 there. XXXX:04BD Have fun! XXXX: lADD These 3 on second version I tried XXXX: lAF6 IH\ 1 1

November COlllPUTIST #81 45 I Bow to place _ UaClaulfied Ad For short ads, use this order form. For larger ads, submit typed copy with appropriate Trade your unwanted software. The COMPUTIST SUPER INDEX instructions. Use every character space, up to 30 characters per line, we will adjust Send your list of programs to now has over 32([)([) records and word wrap. $5 for the first line, $1 per line after that. trade. I have over 70 originals to 14,([)([)([) entriesl Three colossal Special Gl'llphics Instr1Ictlom: The first three words of the first line are printed in bold trade. Byron Blystone, P.O. Box data bases (15 fields each) list for free. Ifyou want other words bolded, use two spaces per letter and circle the entire 1313, Snohonllsh, VVA 98290. every item ever published in word. (Bold letters count as two letters.) If you want a line centered, write CENTER COMPUTIST. See advertisement next to that line. There is no charge for centering any line. PUBLIC DOMAIN , issue 1157, page 45. Prices good $5 Plus morell! through 12/31/88. D.R. Hopkins, 1([)(1)'s of disks. 1([)Q)(l)'s of PRINT 3495 VV. Hoye PI, Denver, CO $' SHOP grahics, APPLEWORKS files, 80219 $7 PRODOS files, EDUCATIONAL, UTILITIES, plus much more. Original Apple Software '1 School purchase orders welcome. New and used. Trade/sell. Over '1 Send $1 for catalog to Continental 1([)([) games and adventures. Also Ito Software Co., Box 1511, So. Glens GS software, hardware, and nrisc. Name ID# _ Falls, NY 12803 Send stamp for list. Steve Address' --'.,.- _ VVadsten, 2CD318 Fremont, HackerDOS Livonia, MI 48152 City State Zip _ Fast DOS 3.3 plus undelete, space Country =- Phone _ on disk, print text file to screen/printer, fast text I/O, addr. ••------'----'--- Exp. --- & length of loaded files, hex/dec Signal\lre' 'CP53 translation, 15 more sectors/disk. .:....O~O::.. Nothing removed, takes no extra Total Number of lines: $i__ spacel Support programs copy Run my ad __ number of times. Each run that I pay any range of sectors, change for now win cost me only '12 the total initial cost. $,_---'=---_ lower -+ uppercase, & customize Total $,_---'=---_ DOS. Options incl. binary/text ·Washington orders add 7.8% sales tax. $,---,--­ boot file, show deleted files, >35 Final Total $,_--=-__ tracks, & 2-column catalog. $5 to: Send this form and a check or money order (funds drawn on US bank only) Phil Goetz for the entire amount to: 4023 Huckleberry Row Ellicott City, MD 21([)43 COMPUTIST unCLASSIFIEDS PO Box 110846 Tacoma, WA 98411

SOUND SYSTEM ™ 2 lEW! 2·Way Ster.. Ampllll.d Speaker Syatell lor yeur Appl. IIga. lie. IIc. 11+. Ind Maclnlllh MEGABm RAM BOARDS! APPLE COMPATIBLE PERIPHERAlSI The Unlmate In RAM Power! 64K/80 Column Beard expands lie to Super Expander GS, a 100% replace- 1281< and adds 80 columns & hi-res. S35 ment for Apple Ilgs 1 meg board. Super 64K/80 Celumn Beard w164K 149 Fully IIgs hardware & software Super 64K/80 Column Board w/256K Cltl compatible. 'K 139 16K RAM Boud expands 11+ to 14K S34 Super Expander E, for U.S. and Euro, 12BK RAM SO expands 11+ to 192K. pean lie. L1cenaed by Applied Engineer· Combine w/Plusworks 2 for 11+ Ap· Ing. 1000/0 replacement for extended pleworks desktop of 136K. 164 80 column card. Expands Apple- Plusworka 2 Software allows 11+ works deaktop to ggBK and allows Appleworks operation. (req 80 col). I3B instant switching between Apple, BO Column SO expands 11+ display to works modules.•K $59 80 columns. (Videx compatible). S48 Super Expander C. expands lie to Super serial Board 100% replacement More veraatlle than the Roommatea by FEATURES: 11521< and Appleworks deakllp to for the Super Serial card. S48 Boal. thla thunderoua Implllied apeaker III 11I62K. plus allows instant switching 180 CP/M Board opens the World of will make all Apple apllch, mualc. gam... • Buill In advanced dealgn amplilier. between modules. 'K S89 CP/M for your 1I+/lIe/llgs. S34 and other aound programa come to III. on • Velume contrel lyou'lI nlld 111. Super Expander +. operates in any 11+ Graphic Puallel Boud w/Cable does any Apple model computer. slot. plus O. Expands Appleworks text &graphic screen prints. $44 Prepare to be blown aWIY when you plug • 2,way auper hlleredyne apeakera. daktop to IDI4K. & allows instant Parallel Boud w/Cable for use where In thla auper powered apeaker syallm. • State of the art nolae flllering. switching between modules. (80 Col graphics is not required. 135 because the advanced dUlgn amplilier 01 req for Appleworks) ••K $79 Dlak Drive 5'1. w/speed adjust. specify the SoundSyatem 2 prevldea over 3 Umea ·.0 alot operation. ABOVE w/256K. 512K. or IMEG CALL your model w/order. 8119 the power II any amplllier beard. • 100% Apple lO\tware cOllpallbl1. And the aound? You wen'l believe your QUIET COllUMS FANSI AlB Swnchbax parallel or serial 129 eara. beclUBe the buill In 2-way atereo • 100% Apple hardware collpallble. AIBICID Swltchbex (par or ser) S39 auper hllerodyne apeakera, coupled with (apeelly your model with order) Superhn II for the 11+/111. Numeric Keypad II for lie S34 state of the art flllering. prevlde an • Comple1e Documentation. Kensington style w/surge protect. 126 Numeric Keypad II for IIc S39 enhanced high quality seund. cryatal clear Super Coller OS for the IIga. Jeyatlck{specify your II model) 817 to Iny IIl1ener. • Full two ye. warranty. No audio line interference. $24 Joyatlck 111 similar to Mach III $24 Rei.... Ihe lull sound pllenllal 01 your Apple computer with Ihe veraallle LOW FACTORY SoundSyatom 2. You never knew your DIRECTPRICE 1129 Apple could sound so goodl (PAIR) NEXO DISTRIBUTION (619) 474-3328 10am-6pm/Mon-Fri 914 East 8th Street, Suite 109, National City, california 92050 A...... AppIeworll••nd MaclnlOlh Ir.dem..... of Apple Compuler, Inc. Bola & Roommllle••re 'rademllrll. of Bo.. Corp.

46 COlllPUTlST #61 Novembel' I 1 The Hacker's UltiMate Cop,' Deprotection Utility Super lOB Collection ! ALL of our Super lOB controllers (through March 1988) in 'ONE' package!

COMPUTIST developed the ultimate copy program The SUPER lOB Collection to remove copy protection from software: Volume 1 of the Super lOB collection covers all the controllers from COMPUTIST NO.9 through No. 26. The Super lOB program. Also included are the newswap and fast controllers from COMPUTIST No. 32. The following 60 controllers Since the introduction of Super lOB, COMPUTIST are on volume 1: has used this flexible program to deprotect (or partially Advanced Blackjack, Alphabet Zoo, Arcade Machine, Archon II, Archon, Artsci Software, Bank Street Writer, deprotect) dozens of commercial· programs with far Barrons SAT, Beyond Castle Wollenstein, BSW IIc Loader, Castle Wolfenstein, Computer Preparation: SAT, ranging protection schemes. Dazzle Draw, DB Master 4 Plus, Death in the Carribean, Dino Eggs, DLM Software, Electronic Arts, F-15 Strike Super lOB deprotects disks by using amodified RWTS Eagle, Fast Controller, Fathoms 40, Financial Cookbook, Gessler Software, Grandma's House, The Heist, In (the subroutine in DOS which is responsible for the Search of the Most Amazing Thing, Instant Recall, Kidwriter, Lions Share, Lode Runner, Mastertype, Match Maker, Miner 204ger, Minit Man, Mufplot, Newsroom, Newswap controller, Penguin Software, Print Shop Graphic reading and writing of disk sectors) for reading from the Library, Print Shop, Rendezvous with Rama, Rockys' Boots, Sargon III, Sea Dragon, Shiela, Sky/ox, Snooper protected disk and then using anormal RWTS for writing Troops, Standard controller, Stoneware Software, Summer Games, Super Controller, Super Zaxxon, Swap to the deprotected disk. Controller, TAC, Ultima I& II, Word Challenge, Xyphus, laxxon This package contains: Volume 2 of the Super lOB collection covers all the controllers from COMPUTIST No. 27 through No. ~ Three disks (supplied in OOS 3.3). Each disk contains 38. The following 65 controllers are on volume 2: at least 60 Super lOB Controllers including the standard, swap, newswap and fast controllers. Also included is Alice in Wonderland, Alphabetic Keyboarding, Alternate Reality, Autoduel, Checkers, Chipwits, Color Me, version 1.5 of Super lOB, the Csaver program from Conan.data, Conan.prog, CopyDOS, Crisis Mountain, Disk Director, Dragonworld, Early Games, Easy as ABC, COMPUTIST No. 13, and a Menu Hello Program that F-15 Strike Eagle, Fantavision, Fast controller, Fishies, Flight Simulator, Halley Project, Hartley Software (a), lists the available controllers and, when you select one, Hartley Software (b), Jenny of the Prarie, Jingle Disk, Kidwriter, Kracking Vol II, Lode Runner, LOGO II (a), LOGO II (b), Masquerade, Mastering the SAT, Microtype: The Wonderful World of Paws, Microzines 1, Microzines automatically installs it in Super lOB and RUNs the 2-5, Miner 204ger, Mist & View to a Kill, Murder on the Zinderneuf, Music Construction Set, Newswap controller, resulting program. * Olympic Decathlon, Other Side, Phi Beta Filer, Pitstop II, Print Shop Companion, RDOS, Robot War, Spy vs Spy, Standard controller, Sundog V2, Swap controller, Sword of Kadash, Synergistic Software, Tawala's Last ~ A reprint of Disk Inspection and the Use of Redoubt, Terripin Logo, Threshold, Time is Money, Time Zone, Tink! Tonk!, Troll's Tale, Ultima IV, Wilderness, Super lOB, from COMPUTIST No. 17. This article Word Attack & Classmate, World's Greatest Baseball, World's Greatest Football explains how to write your own Super lOB controllers. ~ COMPUTIST No. 32, which contains an extensive Volume 3 of the Super lOB collection covers all the controllers from COMPUTIST No. 39 through No. article detailing the hows and whys of Super lOB v1.5 53. The following 89 controllers are on volume 3: and at least 5articles using the new Super lOB program. 24(00) A.D., Alternate Reality: The Dungeon, Address Book, American Challenge, Apple Gradebook V2.6, Arcade • Several of the controllers deprotect the software Album #1, Arcade Boot Camp, Aztec, Bard's Tale II, Beachhead, Beyond Castle Wollenstein, Black Magic, completely with no further steps. This means that some Blue Powder/Grey Smoke, Borrowed Time, Castle Wolfenstein, CatoN-Mouse, Catalyst 2.0 & 3.0. Centipede, Championship Golf, Championship Wrestling, Charlie Brown 123'S, Colonial Conquest, Comprehension Skills, programs are only minutes away from deprotection (with Computer Preparation for the SAT V3, Coveted Mirror, Coveted Mirror RWTS Capture, CPU68C1100NV.4Q2, virtually no typing). Cranston Manor, Crime Stopper, Dam Busters, Decimals, Destroyer, Dino Dig, Earth Orbit Station, Encyclopedia • The issue of COMPUTIST in which each controller Britannica, Escape, Fish Scales, Foundation Course in Spanish, Frog, GFL Football, Goonies, Great American Cross-Country Road Race, Handlers, H.E.R.O, Inferno, Information Master, J·Bird, Jenny's Journeys, Joe appeared is indicated in case further steps are required Theisman Football, Kindercomp, Kung Fu, Light Simulator, Manuscript Manager, Master Diagnostics lie, to deprotect a particular program. ** Mastering Math, MECC, MECC Software, MECC Swap, MECC Without RWTS, Missing Links, No Error Check & No DOS, Ogre, One On One, Oregon Trail, Penguin Software, PFS ProDOS, Pitfall II, Puzzles&Posters, 'Requires at least 64K of memory. "Although some controllers will completely deprotect Racter, Randamn, Reading Style Inventory, Ring Quest, SCience Toolkit, SCience Toolkit Rev1, Sky/ox, Snooper the program they were designed for. some will not. and Troops, Speed Reader II, Spy's Adventure, Starcross, Super Bunny, Temple Apshai Trilogy, The American therefore require their corresponding issue of Challenge, Translyvania, Troll Courseware, Ultima I, Ultima IV, Wizard's Crown, Word Attack, Word Maze, COMPUTIST to complete the deprotection procedure. World Karate Championship, Rings of lillin, Zorro

~------~• • Yes, please send me The Super lOB Collection • Includes all three disks with Super lOB version 1.5, COMPUTIST #32, PLUS Name 10# I a reprint of "Disk Inspection and the Use of Super JOB". Address • City State Zip • o US/Canada/Mexico - All three volumes $24.00 • o Other Foreign - All three volumes $30.00 Country Phone o US/Canada/Mexico - Volume #3 only $9.00 ___ •I o Other Foreign - Volume #3 only $12.00 •• ------.Exp. • Send to: Super lOB Collection Signature CP61 • PO Box 110846-T • • Tacoma, WA 98411 Most orders are shipped within 5 working days. however. please allow • • 4 to 6 weeks for delivery. Washington residents, please add 7.8% sales tax. • • or call: (206) 474-5750 forE or. orders. US funds drawn on US banks • ~------~ November COMPUTIST #61 47 Volu:an I C011lpiled fr011l lssues 1-5 contains softkeys for: -Akalabeth -Ampermagic -Apple Galaxian -Aztec -Bag of Tricks -Budge's Trilogy -Buzzard Bait -Cannonball Blitz -Casino -Data Reporter -Deadline -Disk Organizer II -Egbert II Communic. Disk -Hard Hat Mack -Home Accountant -Homeword -Lancaster -Magic Window II -Multi­ disk Catalog -Multiplan -Pest Patrol -Prisoner II -Sammy Lightfoot -Screen Writer II -Sneakers -Spy's Demise -Starcross -Suspended -Ultima II -Visifile -Visiplot -Visitrend -Witness -Wizardry -Zork I -Zork II -Zork III 0 PLUS 'how-to' articles and listings of need-to-have programs used to make unprotected backups.

Volu:ane II C011lpiled fro11l lssues 6-10 contains softkeys for: -Apple Cider Spider -Apple Logo -Artist Arcade Machine -Bank Street Writer -Cannonball Blitz -Canyon Climber -Caverns of Freitag -Crush, Crumble & Chomp -Data Factory V -DB Master -The Dic*tion*ary -Essential Data Duplicator I & III -Gold Rush -Krell Logo -Legacy of Llylgamyn -Mask Of The Sun -Minit Man -Mouskattack -Music Construction Set -Oil's Well -Pandora's Box -Robotron -Sammy Lightfoot -Screenwriter II v2.2 -Sensible Speller 4,4c,4.1c -Spy Strikes Back -Time Zone v1.1 -Visible Computer: 6502 -Visidex -Visiterm -Zaxxon • software for: -Hayden -Sierra Online o PLUS the ultimate cracking program: Super lOB 1.5 "-and more!

Volunae III C011lpiled fro11l lssues 11-15 contains softkeys for: -Alien Addition -Alien Munchies -Alligator Mix -Compo Prep. SAT -Cut & Paste -Demolition Division. -DLM software -EA (Electronic Arts) software -Einstein Compiler 5.3 -Escape From Rungistan -Financial Cookbook -Flip Out -Hi-res Computer Golf II -Knoware -Laf Pak -Last Gladiator -Learning With Leeper -Lion's Share -Master Type 1.7 -MatheMagic -Minus Mission -Millionaire -Music Construction Set -One-on-one -Penguin software -PFS software -The Quest -Rocky's Boots -Sabotage -Seadragon -Sensible Speller 4 -Snooper Troops II -SoftPorn Adventure -Stickybear series -Suicide -TellStar -Tic Tac Show -Time Is Money -Transylvania -Type Attack -Ultima III Exodus -Zoom Graphics -Breaking Locksmith 5.0 Fast Copy 0 PLUS feature articles on • Csaver • The Core Disk Searcher • Modified ROMs. ------

Name 10# 0 Volume I- $7.95 +$2 shipping/handling Address 0 Volume II - $12.95 City State Zip +$2 shipping/handling Volume III - $17.95 Country Phone 0 +$2 shipping/handLing '\!l!r' Exp. 0 All 3 volumes! - $30.00 +$2 shipping/handling Signature CP61

Foreign orders (except Canada and Mexico) please add $5 per book for shipping and handling. Washington residents add 7.8% sales tax. Most orders are shipped within 5 working days, however, please allow 4-6 weeks delivery. US Funds drawn on US banks only. Send to: Book of Softkeys PO Box 110846-T Tacoma, WA 98411 (206) 474-5750

COMPUTIST #81 November I